Action not permitted
Modal body text goes here.
CVE-2017-7529
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html | Vendor Advisory | |
secalert@redhat.com | http://seclists.org/fulldisclosure/2021/Sep/36 | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/99534 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1039238 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2017:2538 | Third Party Advisory | |
secalert@redhat.com | https://puppet.com/security/cve/cve-2017-7529 | Third Party Advisory | |
secalert@redhat.com | https://support.apple.com/kb/HT212818 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:11.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[nginx-announce] 20170711 nginx security advisory (CVE-2017-7529)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html" }, { "name": "RHSA-2017:2538", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2538" }, { "name": "99534", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99534" }, { "name": "1039238", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039238" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://puppet.com/security/cve/cve-2017-7529" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nginx", "vendor": "nginx", "versions": [ { "status": "affected", "version": "0.5.6 - 1.13.2" } ] } ], "datePublic": "2017-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-21T23:07:12", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[nginx-announce] 20170711 nginx security advisory (CVE-2017-7529)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html" }, { "name": "RHSA-2017:2538", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2538" }, { "name": "99534", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99534" }, { "name": "1039238", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039238" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://puppet.com/security/cve/cve-2017-7529" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2017-07-11T00:00:00", "ID": "CVE-2017-7529", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "nginx", "version": { "version_data": [ { "version_value": "0.5.6 - 1.13.2" } ] } } ] }, "vendor_name": "nginx" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "[nginx-announce] 20170711 nginx security advisory (CVE-2017-7529)", "refsource": "MLIST", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html" }, { "name": "RHSA-2017:2538", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2538" }, { "name": "99534", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99534" }, { "name": "1039238", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039238" }, { "name": "https://puppet.com/security/cve/cve-2017-7529", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/cve-2017-7529" }, { "name": "https://support.apple.com/kb/HT212818", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-7529", "datePublished": "2017-07-13T13:00:00Z", "dateReserved": "2017-04-05T00:00:00", "dateUpdated": "2024-09-16T18:39:56.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-7529\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2017-07-13T13:29:00.220\",\"lastModified\":\"2022-01-24T16:46:04.030\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.\"},{\"lang\":\"es\",\"value\":\"Las versiones desde la 0.5.6 hasta 1.13.2 incluy\u00e9ndola de Nginx, son susceptibles a una vulnerabilidad de desbordamiento de enteros en el m\u00f3dulo filtro de rango de nginx, resultando en un filtrado de informaci\u00f3n potencialmente confidencial activada por una petici\u00f3n especialmente creada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.5.6\",\"versionEndIncluding\":\"1.12.1\",\"matchCriteriaId\":\"D19034A4-1211-4A40-A2D3-2A9F87770081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.13.0\",\"versionEndIncluding\":\"1.13.2\",\"matchCriteriaId\":\"BA59CB1C-4A69-4593-9D22-9B45FCA70490\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2016.4.7\",\"matchCriteriaId\":\"B7ABD977-A333-473B-806D-32ECD7909B35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2017.1.0\",\"versionEndIncluding\":\"2017.1.1\",\"matchCriteriaId\":\"15CC6F3C-8DA8-4CE0-8E9A-057A0F55DEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2017.2.1\",\"versionEndIncluding\":\"2017.2.3\",\"matchCriteriaId\":\"38CBF065-5219-463A-9677-86088D761584\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.0\",\"matchCriteriaId\":\"BB279F6B-EE4C-4885-9CD4-657F6BD2548F\"}]}]}],\"references\":[{\"url\":\"http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/36\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99534\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039238\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2538\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://puppet.com/security/cve/cve-2017-7529\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212818\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-85mj-h68w-w736
Vulnerability from github
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
{ "affected": [], "aliases": [ "CVE-2017-7529" ], "database_specific": { "cwe_ids": [ "CWE-190" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-07-13T13:29:00Z", "severity": "HIGH" }, "details": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.", "id": "GHSA-85mj-h68w-w736", "modified": "2022-05-13T01:04:15Z", "published": "2022-05-13T01:04:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7529" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2538" }, { "type": "WEB", "url": "https://puppet.com/security/cve/cve-2017-7529" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT212818" }, { "type": "WEB", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2021/Sep/36" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/99534" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1039238" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
rhsa-2017_2538
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nginx110-nginx is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 and IMAP protocols, with a strong focus on high concurrency, performance and low memory usage.\n\nSecurity Fix(es):\n\n* A flaw within the processing of ranged HTTP requests has been discovered in the range filter module of nginx. A remote attacker could possibly exploit this flaw to disclose parts of the cache file header, or, if used in combination with third party modules, disclose potentially sensitive memory by sending specially crafted HTTP requests. (CVE-2017-7529)\n\nRed Hat would like to thank the Nginx project for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2538", "url": "https://access.redhat.com/errata/RHSA-2017:2538" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1468584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468584" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2538.json" } ], "title": "Red Hat Security Advisory: rh-nginx110-nginx security update", "tracking": { "current_release_date": "2024-11-14T23:37:15+00:00", "generator": { "date": "2024-11-14T23:37:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:2538", "initial_release_date": "2017-08-28T21:59:32+00:00", "revision_history": [ { "date": "2017-08-28T21:59:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-08-28T21:59:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:37:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "product": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "product_id": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-debuginfo@1.10.2-8.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "product_id": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-perl@1.10.2-8.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "product": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "product_id": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-stream@1.10.2-8.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "product": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "product_id": "rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx@1.10.2-8.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "product_id": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-xslt-filter@1.10.2-8.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "product_id": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-image-filter@1.10.2-8.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "product": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "product_id": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-mail@1.10.2-8.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "product": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "product_id": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-debuginfo@1.10.2-8.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "product_id": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-perl@1.10.2-8.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "product": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "product_id": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-stream@1.10.2-8.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "product": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "product_id": "rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx@1.10.2-8.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "product_id": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-xslt-filter@1.10.2-8.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "product": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "product_id": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-mail@1.10.2-8.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "product": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "product_id": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx-mod-http-image-filter@1.10.2-8.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nginx110-nginx-1:1.10.2-8.el6.src", "product": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.src", "product_id": "rh-nginx110-nginx-1:1.10.2-8.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx@1.10.2-8.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx110-nginx-1:1.10.2-8.el7.src", "product": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.src", "product_id": "rh-nginx110-nginx-1:1.10.2-8.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx110-nginx@1.10.2-8.el7?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-1:1.10.2-8.el6.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el6.src", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-1:1.10.2-8.el7.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.src", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.src", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.src" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64" }, "product_reference": "rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Nginx project" ] } ], "cve": "CVE-2017-7529", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2017-06-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1468584" } ], "notes": [ { "category": "description", "text": "A flaw within the processing of ranged HTTP requests has been discovered in the range filter module of nginx. A remote attacker could possibly exploit this flaw to disclose parts of the cache file header, or, if used in combination with third party modules, disclose potentially sensitive memory by sending specially crafted HTTP requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Integer overflow in nginx range filter module leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-1:1.10.2-8.el6.src", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.src", "6Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.src", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-1:1.10.2-8.el7.src", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.src", "7Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.src", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7529" }, { "category": "external", "summary": "RHBZ#1468584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7529", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7529" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7529", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7529" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html" } ], "release_date": "2017-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-28T21:59:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-1:1.10.2-8.el6.src", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.src", "6Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.src", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-1:1.10.2-8.el7.src", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.src", "7Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.src", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2538" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-1:1.10.2-8.el6.src", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4-6.7.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.src", "6Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "6Server-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.src", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el6.x86_64", "6Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el6.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-1:1.10.2-8.el7.src", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4-7.3.Z:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.src", "7Server-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "7Server-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.src", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-debuginfo-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-image-filter-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-perl-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-http-xslt-filter-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-mail-1:1.10.2-8.el7.x86_64", "7Workstation-RHSCL-2.4:rh-nginx110-nginx-mod-stream-1:1.10.2-8.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nginx: Integer overflow in nginx range filter module leading to memory disclosure" } ] }
gsd-2017-7529
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-7529", "description": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.", "id": "GSD-2017-7529", "references": [ "https://www.suse.com/security/cve/CVE-2017-7529.html", "https://www.debian.org/security/2017/dsa-3908", "https://access.redhat.com/errata/RHSA-2017:2538", "https://ubuntu.com/security/CVE-2017-7529", "https://advisories.mageia.org/CVE-2017-7529.html", "https://security.archlinux.org/CVE-2017-7529", "https://alas.aws.amazon.com/cve/html/CVE-2017-7529.html", "https://linux.oracle.com/cve/CVE-2017-7529.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-7529" ], "details": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.", "id": "GSD-2017-7529", "modified": "2023-12-13T01:21:06.911859Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2017-07-11T00:00:00", "ID": "CVE-2017-7529", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "nginx", "version": { "version_data": [ { "version_value": "0.5.6 - 1.13.2" } ] } } ] }, "vendor_name": "nginx" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "[nginx-announce] 20170711 nginx security advisory (CVE-2017-7529)", "refsource": "MLIST", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html" }, { "name": "RHSA-2017:2538", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2538" }, { "name": "99534", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99534" }, { "name": "1039238", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039238" }, { "name": "https://puppet.com/security/cve/cve-2017-7529", "refsource": "CONFIRM", "url": "https://puppet.com/security/cve/cve-2017-7529" }, { "name": "https://support.apple.com/kb/HT212818", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.12.1", "versionStartIncluding": "0.5.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.13.2", "versionStartIncluding": "1.13.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2017.1.1", "versionStartIncluding": "2017.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2017.2.3", "versionStartIncluding": "2017.2.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2016.4.7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-7529" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "[nginx-announce] 20170711 nginx security advisory (CVE-2017-7529)", "refsource": "MLIST", "tags": [ "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html" }, { "name": "99534", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99534" }, { "name": "1039238", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039238" }, { "name": "https://puppet.com/security/cve/cve-2017-7529", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://puppet.com/security/cve/cve-2017-7529" }, { "name": "RHSA-2017:2538", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2538" }, { "name": "https://support.apple.com/kb/HT212818", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-01-24T16:46Z", "publishedDate": "2017-07-13T13:29Z" } } }
var-201707-1309
Vulnerability from variot
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request. nginx is prone to a remote integer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to obtain sensitive information or may crash the application resulting in a denial-of-service condition. nginx 0.5.6 through 1.13.2 are vulnerable. Nginx is a lightweight web server/reverse proxy server and email (IMAP/POP3) proxy server developed by Russian programmer Igor Sysoev. The range filter module is one of the range filter modules.
For the oldstable distribution (jessie), this problem has been fixed in version 1.6.2-5+deb8u5.
For the stable distribution (stretch), this problem has been fixed in version 1.10.3-1+deb9u1.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your nginx packages.
Ubuntu Security Notice USN-3352-1 July 13, 2017
nginx vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
nginx could be made to expose sensitive information over the network. A remote attacker could use this to expose sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.04: nginx-common 1.10.3-1ubuntu3.1 nginx-core 1.10.3-1ubuntu3.1 nginx-extras 1.10.3-1ubuntu3.1 nginx-full 1.10.3-1ubuntu3.1 nginx-light 1.10.3-1ubuntu3.1
Ubuntu 16.10: nginx-common 1.10.1-0ubuntu1.3 nginx-core 1.10.1-0ubuntu1.3 nginx-extras 1.10.1-0ubuntu1.3 nginx-full 1.10.1-0ubuntu1.3 nginx-light 1.10.1-0ubuntu1.3
Ubuntu 16.04 LTS: nginx-common 1.10.3-0ubuntu0.16.04.2 nginx-core 1.10.3-0ubuntu0.16.04.2 nginx-extras 1.10.3-0ubuntu0.16.04.2 nginx-full 1.10.3-0ubuntu0.16.04.2 nginx-light 1.10.3-0ubuntu0.16.04.2
Ubuntu 14.04 LTS: nginx-common 1.4.6-1ubuntu3.8 nginx-core 1.4.6-1ubuntu3.8 nginx-extras 1.4.6-1ubuntu3.8 nginx-full 1.4.6-1ubuntu3.8 nginx-light 1.4.6-1ubuntu3.8
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Low: rh-nginx110-nginx security update Advisory ID: RHSA-2017:2538-01 Product: Red Hat Software Collections Advisory URL: https://access.redhat.com/errata/RHSA-2017:2538 Issue date: 2017-08-28 CVE Names: CVE-2017-7529 =====================================================================
- Summary:
An update for rh-nginx110-nginx is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- Description:
Nginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 and IMAP protocols, with a strong focus on high concurrency, performance and low memory usage. A remote attacker could possibly exploit this flaw to disclose parts of the cache file header, or, if used in combination with third party modules, disclose potentially sensitive memory by sending specially crafted HTTP requests. (CVE-2017-7529)
Red Hat would like to thank the Nginx project for reporting this issue.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source: rh-nginx110-nginx-1.10.2-8.el6.src.rpm
x86_64: rh-nginx110-nginx-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-debuginfo-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-http-perl-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-mail-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-stream-1.10.2-8.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):
Source: rh-nginx110-nginx-1.10.2-8.el6.src.rpm
x86_64: rh-nginx110-nginx-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-debuginfo-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-http-perl-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-mail-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-stream-1.10.2-8.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source: rh-nginx110-nginx-1.10.2-8.el6.src.rpm
x86_64: rh-nginx110-nginx-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-debuginfo-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-http-perl-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-mail-1.10.2-8.el6.x86_64.rpm rh-nginx110-nginx-mod-stream-1.10.2-8.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source: rh-nginx110-nginx-1.10.2-8.el7.src.rpm
x86_64: rh-nginx110-nginx-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-debuginfo-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-http-perl-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-mail-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-stream-1.10.2-8.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3):
Source: rh-nginx110-nginx-1.10.2-8.el7.src.rpm
x86_64: rh-nginx110-nginx-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-debuginfo-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-http-perl-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-mail-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-stream-1.10.2-8.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-nginx110-nginx-1.10.2-8.el7.src.rpm
x86_64: rh-nginx110-nginx-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-debuginfo-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-http-perl-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-mail-1.10.2-8.el7.x86_64.rpm rh-nginx110-nginx-mod-stream-1.10.2-8.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2017-7529 https://access.redhat.com/security/updates/classification/#low
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFZpJOQXlSAg2UNWIIRAmScAJ4wJSfq0I+2JBvww6c9AkJKZx4YAACdHwbT Rf+yBkpEe91OHNNto3rboqM= =rlDh -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2021-09-20-4 Xcode 13
Xcode 13 addresses the following issues.
IDE Xcode Server Available for: macOS Big Sur 11.3 and later Impact: Multiple issues in nginx Description: Multiple issues were addressed by updating nginx to version 1.21.0. CVE-2016-0742 CVE-2016-0746 CVE-2016-0747 CVE-2017-7529 CVE-2018-16843 CVE-2018-16844 CVE-2018-16845 CVE-2019-20372
Installation note:
Xcode 13 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
- Select Xcode in the menu bar
- Select About Xcode
- The version after applying this update will be "Xcode 13"
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201707-1309", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nginx", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "1.12.1" }, { "model": "enterprise", "scope": "lte", "trust": 1.0, "vendor": "puppet", "version": "2017.1.1" }, { "model": "enterprise", "scope": "lte", "trust": 1.0, "vendor": "puppet", "version": "2017.2.3" }, { "model": "enterprise", "scope": "gte", "trust": 1.0, "vendor": "puppet", "version": "2017.1.0" }, { "model": "nginx", "scope": "lte", "trust": 1.0, "vendor": "f5", "version": "1.13.2" }, { "model": "enterprise", "scope": "gte", "trust": 1.0, "vendor": "puppet", "version": "2017.2.1" }, { "model": "enterprise", "scope": "lt", "trust": 1.0, "vendor": "puppet", "version": "2016.4.7" }, { "model": "xcode", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "13.0" }, { "model": "nginx", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "1.13.0" }, { "model": "nginx", "scope": "gte", "trust": 1.0, "vendor": "f5", "version": "0.5.6" }, { "model": "nginx", "scope": "eq", "trust": 0.9, "vendor": "nginx", "version": "1.11.12" }, { "model": "nginx", "scope": null, "trust": 0.8, "vendor": "igor sysoev", "version": null }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "nginx", "version": "1.11.10" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "nginx", "version": "1.13.1" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "nginx", "version": "1.11.13" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "nginx", "version": "1.11.9" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "nginx", "version": "1.13.0" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "nginx", "version": "1.11.8" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "nginx", "version": "1.13.2" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "nginx", "version": "1.11.11" }, { "model": "nginx", "scope": "eq", "trust": 0.6, "vendor": "nginx", "version": "1.11.7" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.12" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.11.1" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.11" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.10.3" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.10.1" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.10" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.9.15" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.9.10" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.9.9" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.9" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.8.1" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.8" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.7.12" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.7" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.6.3" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.13" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.4.7" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.16" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.15" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.14" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.11" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.2.9" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.18" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.17" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.9.7" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.9" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.8.55" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.8.36" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.8" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.7.69" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.7" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.6.39" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.6.18" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.6" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "0.5.6" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.6.1" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.6.0" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.9" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.8" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.7" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.6" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.5" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.4" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.3" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.2" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.12" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.11" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.5.10" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.4.2" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.4.1" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.4.0" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.9" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.8" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.7" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.6" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.5" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.4" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.3" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.2" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.13" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.12" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.10" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.1" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.3.0" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.2.0" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.9" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.8" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.7" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.6" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.5" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.4" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.3" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.2" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.19" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.16" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.15" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.14" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.13" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.12" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.11" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.10" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.1" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.1.0" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.9" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.8" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.7" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.6" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.5" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.4" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.3" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.2" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.15" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.14" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.13" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.12" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.10" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.1" }, { "model": "nginx", "scope": "eq", "trust": 0.3, "vendor": "nginx", "version": "1.0.0" }, { "model": "nginx", "scope": "ne", "trust": 0.3, "vendor": "nginx", "version": "1.13.3" }, { "model": "nginx", "scope": "ne", "trust": 0.3, "vendor": "nginx", "version": "1.12.1" } ], "sources": [ { "db": "BID", "id": "99534" }, { "db": "JVNDB", "id": "JVNDB-2017-006088" }, { "db": "NVD", "id": "CVE-2017-7529" }, { "db": "CNNVD", "id": "CNNVD-201707-563" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.12.1", "versionStartIncluding": "0.5.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.13.2", "versionStartIncluding": "1.13.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2017.1.1", "versionStartIncluding": "2017.1.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2017.2.3", "versionStartIncluding": "2017.2.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2016.4.7", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-7529" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "99534" } ], "trust": 0.3 }, "cve": "CVE-2017-7529", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2017-7529", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-115732", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-7529", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-7529", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201707-563", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-115732", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-7529", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-115732" }, { "db": "VULMON", "id": "CVE-2017-7529" }, { "db": "JVNDB", "id": "JVNDB-2017-006088" }, { "db": "NVD", "id": "CVE-2017-7529" }, { "db": "CNNVD", "id": "CNNVD-201707-563" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request. nginx is prone to a remote integer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. \nAttackers can exploit this issue to obtain sensitive information or may crash the application resulting in a denial-of-service condition. \nnginx 0.5.6 through 1.13.2 are vulnerable. Nginx is a lightweight web server/reverse proxy server and email (IMAP/POP3) proxy server developed by Russian programmer Igor Sysoev. The range filter module is one of the range filter modules. \n\nFor the oldstable distribution (jessie), this problem has been fixed\nin version 1.6.2-5+deb8u5. \n\nFor the stable distribution (stretch), this problem has been fixed in\nversion 1.10.3-1+deb9u1. \n\nFor the unstable distribution (sid), this problem will be fixed soon. \n\nWe recommend that you upgrade your nginx packages. \n==========================================================================\nUbuntu Security Notice USN-3352-1\nJuly 13, 2017\n\nnginx vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 17.04\n- Ubuntu 16.10\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n\nSummary:\n\nnginx could be made to expose sensitive information over the network. A remote attacker could use this to expose\nsensitive information. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 17.04:\n nginx-common 1.10.3-1ubuntu3.1\n nginx-core 1.10.3-1ubuntu3.1\n nginx-extras 1.10.3-1ubuntu3.1\n nginx-full 1.10.3-1ubuntu3.1\n nginx-light 1.10.3-1ubuntu3.1\n\nUbuntu 16.10:\n nginx-common 1.10.1-0ubuntu1.3\n nginx-core 1.10.1-0ubuntu1.3\n nginx-extras 1.10.1-0ubuntu1.3\n nginx-full 1.10.1-0ubuntu1.3\n nginx-light 1.10.1-0ubuntu1.3\n\nUbuntu 16.04 LTS:\n nginx-common 1.10.3-0ubuntu0.16.04.2\n nginx-core 1.10.3-0ubuntu0.16.04.2\n nginx-extras 1.10.3-0ubuntu0.16.04.2\n nginx-full 1.10.3-0ubuntu0.16.04.2\n nginx-light 1.10.3-0ubuntu0.16.04.2\n\nUbuntu 14.04 LTS:\n nginx-common 1.4.6-1ubuntu3.8\n nginx-core 1.4.6-1ubuntu3.8\n nginx-extras 1.4.6-1ubuntu3.8\n nginx-full 1.4.6-1ubuntu3.8\n nginx-light 1.4.6-1ubuntu3.8\n\nIn general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Low: rh-nginx110-nginx security update\nAdvisory ID: RHSA-2017:2538-01\nProduct: Red Hat Software Collections\nAdvisory URL: https://access.redhat.com/errata/RHSA-2017:2538\nIssue date: 2017-08-28\nCVE Names: CVE-2017-7529 \n=====================================================================\n\n1. Summary:\n\nAn update for rh-nginx110-nginx is now available for Red Hat Software\nCollections. \n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3) - x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nNginx is a web server and a reverse proxy server for HTTP, SMTP, POP3 and\nIMAP protocols, with a strong focus on high concurrency, performance and\nlow memory usage. A remote attacker could possibly\nexploit this flaw to disclose parts of the cache file header, or, if used\nin combination with third party modules, disclose potentially sensitive\nmemory by sending specially crafted HTTP requests. (CVE-2017-7529)\n\nRed Hat would like to thank the Nginx project for reporting this issue. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):\n\nSource:\nrh-nginx110-nginx-1.10.2-8.el6.src.rpm\n\nx86_64:\nrh-nginx110-nginx-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-debuginfo-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-http-perl-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-mail-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-stream-1.10.2-8.el6.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):\n\nSource:\nrh-nginx110-nginx-1.10.2-8.el6.src.rpm\n\nx86_64:\nrh-nginx110-nginx-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-debuginfo-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-http-perl-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-mail-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-stream-1.10.2-8.el6.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nrh-nginx110-nginx-1.10.2-8.el6.src.rpm\n\nx86_64:\nrh-nginx110-nginx-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-debuginfo-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-http-perl-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-mail-1.10.2-8.el6.x86_64.rpm\nrh-nginx110-nginx-mod-stream-1.10.2-8.el6.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-nginx110-nginx-1.10.2-8.el7.src.rpm\n\nx86_64:\nrh-nginx110-nginx-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-debuginfo-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-http-perl-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-mail-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-stream-1.10.2-8.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3):\n\nSource:\nrh-nginx110-nginx-1.10.2-8.el7.src.rpm\n\nx86_64:\nrh-nginx110-nginx-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-debuginfo-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-http-perl-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-mail-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-stream-1.10.2-8.el7.x86_64.rpm\n\nRed Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-nginx110-nginx-1.10.2-8.el7.src.rpm\n\nx86_64:\nrh-nginx110-nginx-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-debuginfo-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-http-image-filter-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-http-perl-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-http-xslt-filter-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-mail-1.10.2-8.el7.x86_64.rpm\nrh-nginx110-nginx-mod-stream-1.10.2-8.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-7529\nhttps://access.redhat.com/security/updates/classification/#low\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFZpJOQXlSAg2UNWIIRAmScAJ4wJSfq0I+2JBvww6c9AkJKZx4YAACdHwbT\nRf+yBkpEe91OHNNto3rboqM=\n=rlDh\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2021-09-20-4 Xcode 13\n\nXcode 13 addresses the following issues. \n\nIDE Xcode Server\nAvailable for: macOS Big Sur 11.3 and later\nImpact: Multiple issues in nginx\nDescription: Multiple issues were addressed by updating nginx to\nversion 1.21.0. \nCVE-2016-0742\nCVE-2016-0746\nCVE-2016-0747\nCVE-2017-7529\nCVE-2018-16843\nCVE-2018-16844\nCVE-2018-16845\nCVE-2019-20372\n\nInstallation note:\n\nXcode 13 may be obtained from:\n\nhttps://developer.apple.com/xcode/downloads/\n\nTo check that the Xcode has been updated:\n\n* Select Xcode in the menu bar\n* Select About Xcode\n* The version after applying this update will be \"Xcode 13\"", "sources": [ { "db": "NVD", "id": "CVE-2017-7529" }, { "db": "JVNDB", "id": "JVNDB-2017-006088" }, { "db": "BID", "id": "99534" }, { "db": "VULHUB", "id": "VHN-115732" }, { "db": "VULMON", "id": "CVE-2017-7529" }, { "db": "PACKETSTORM", "id": "143348" }, { "db": "PACKETSTORM", "id": "143347" }, { "db": "PACKETSTORM", "id": "143935" }, { "db": "PACKETSTORM", "id": "164240" } ], "trust": 2.43 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-115732", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-115732" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-7529", "trust": 3.3 }, { "db": "BID", "id": "99534", "trust": 2.0 }, { "db": "SECTRACK", "id": "1039238", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-006088", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201707-563", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "164240", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.3157", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1701", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "143935", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "143348", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "143347", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-96273", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-115732", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-7529", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-115732" }, { "db": "VULMON", "id": "CVE-2017-7529" }, { "db": "BID", "id": "99534" }, { "db": "JVNDB", "id": "JVNDB-2017-006088" }, { "db": "PACKETSTORM", "id": "143348" }, { "db": "PACKETSTORM", "id": "143347" }, { "db": "PACKETSTORM", "id": "143935" }, { "db": "PACKETSTORM", "id": "164240" }, { "db": "NVD", "id": "CVE-2017-7529" }, { "db": "CNNVD", "id": "CNNVD-201707-563" } ] }, "id": "VAR-201707-1309", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-115732" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:53:03.181000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2017-7529", "trust": 0.8, "url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html" }, { "title": "Nginx range filter Fixes for module digital error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=71698" }, { "title": "Ubuntu Security Notice: nginx vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3352-1" }, { "title": "Debian Security Advisories: DSA-3908-1 nginx -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=704f48ff7bd09792912d23527ab54543" }, { "title": "Debian CVElist Bug Report Logs: nginx: CVE-2017-7529 Integer overflow in the range filter", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a0f173670cb05b0faed5127f8a0445b1" }, { "title": "Amazon Linux AMI: ALAS-2017-894", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2017-894" }, { "title": "Red Hat: CVE-2017-7529", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2017-7529" }, { "title": "Arch Linux Advisories: [ASA-201707-12] nginx-mainline: information disclosure", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=asa-201707-12" }, { "title": "Arch Linux Advisories: [ASA-201707-11] nginx: information disclosure", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=asa-201707-11" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2017-7529" }, { "title": "nginxpwner", "trust": 0.1, "url": "https://github.com/stark0de/nginxpwner " }, { "title": "cve-2017-7529", "trust": 0.1, "url": "https://github.com/cved-sources/cve-2017-7529 " }, { "title": "nginx-CVE-2017-7529", "trust": 0.1, "url": "https://github.com/cyberharsh/nginx-cve-2017-7529 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-7529" }, { "db": "JVNDB", "id": "JVNDB-2017-006088" }, { "db": "CNNVD", "id": "CNNVD-201707-563" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-115732" }, { "db": "JVNDB", "id": "JVNDB-2017-006088" }, { "db": "NVD", "id": "CVE-2017-7529" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2017:2538" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/99534" }, { "trust": 1.7, "url": "https://puppet.com/security/cve/cve-2017-7529" }, { "trust": 1.7, "url": "https://support.apple.com/kb/ht212818" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2021/sep/36" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1039238" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7529" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7529" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht212818" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3157" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1701/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164240/apple-security-advisory-2021-09-20-4.html" }, { "trust": 0.3, "url": "http://nginx.org/" }, { "trust": 0.3, "url": "http://nginx.org/#2017-07-11" }, { "trust": 0.3, "url": "http://nginx.org/en/security_advisories.html" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3352-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nginx/1.10.3-0ubuntu0.16.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nginx/1.10.3-1ubuntu3.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nginx/1.4.6-1ubuntu3.8" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nginx/1.10.1-0ubuntu1.3" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#low" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7529" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20372" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16843" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16845" }, { "trust": 0.1, "url": "https://developer.apple.com/xcode/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16844" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0746" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0747" }, { "trust": 0.1, "url": "https://support.apple.com/ht212818." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0742" } ], "sources": [ { "db": "VULHUB", "id": "VHN-115732" }, { "db": "BID", "id": "99534" }, { "db": "JVNDB", "id": "JVNDB-2017-006088" }, { "db": "PACKETSTORM", "id": "143348" }, { "db": "PACKETSTORM", "id": "143347" }, { "db": "PACKETSTORM", "id": "143935" }, { "db": "PACKETSTORM", "id": "164240" }, { "db": "NVD", "id": "CVE-2017-7529" }, { "db": "CNNVD", "id": "CNNVD-201707-563" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-115732" }, { "db": "VULMON", "id": "CVE-2017-7529" }, { "db": "BID", "id": "99534" }, { "db": "JVNDB", "id": "JVNDB-2017-006088" }, { "db": "PACKETSTORM", "id": "143348" }, { "db": "PACKETSTORM", "id": "143347" }, { "db": "PACKETSTORM", "id": "143935" }, { "db": "PACKETSTORM", "id": "164240" }, { "db": "NVD", "id": "CVE-2017-7529" }, { "db": "CNNVD", "id": "CNNVD-201707-563" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-13T00:00:00", "db": "VULHUB", "id": "VHN-115732" }, { "date": "2017-07-13T00:00:00", "db": "VULMON", "id": "CVE-2017-7529" }, { "date": "2017-07-11T00:00:00", "db": "BID", "id": "99534" }, { "date": "2017-08-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-006088" }, { "date": "2017-07-14T02:16:01", "db": "PACKETSTORM", "id": "143348" }, { "date": "2017-07-14T02:15:51", "db": "PACKETSTORM", "id": "143347" }, { "date": "2017-08-28T21:24:00", "db": "PACKETSTORM", "id": "143935" }, { "date": "2021-09-22T16:28:58", "db": "PACKETSTORM", "id": "164240" }, { "date": "2017-07-13T13:29:00.220000", "db": "NVD", "id": "CVE-2017-7529" }, { "date": "2017-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201707-563" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-10T00:00:00", "db": "VULHUB", "id": "VHN-115732" }, { "date": "2022-01-24T00:00:00", "db": "VULMON", "id": "CVE-2017-7529" }, { "date": "2017-07-11T00:00:00", "db": "BID", "id": "99534" }, { "date": "2017-08-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-006088" }, { "date": "2022-01-24T16:46:04.030000", "db": "NVD", "id": "CVE-2017-7529" }, { "date": "2023-05-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201707-563" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "143347" }, { "db": "PACKETSTORM", "id": "143935" }, { "db": "CNNVD", "id": "CNNVD-201707-563" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nginx of range filter Module integer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-006088" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201707-563" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.