Action not permitted
Modal body text goes here.
CVE-2019-9512
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:54:44.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#605641", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "name": "DSA-4503", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4503" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K98053339" }, { "name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "openSUSE-SU-2019:2000", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "name": "FEDORA-2019-5a6a7bc12c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "20190825 [SECURITY] [DSA 4508-1] h2o security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "name": "DSA-4508", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4508" }, { "name": "openSUSE-SU-2019:2056", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "name": "openSUSE-SU-2019:2072", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "name": "FEDORA-2019-55d101a740", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "name": "FEDORA-2019-65db7ad6c7", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "name": "openSUSE-SU-2019:2085", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "name": "RHSA-2019:2682", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "name": "DSA-4520", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "RHSA-2019:2726", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "RHSA-2019:2594", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "openSUSE-SU-2019:2114", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "RHSA-2019:2661", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2690", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "name": "RHSA-2019:2766", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "name": "openSUSE-SU-2019:2130", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "name": "RHSA-2019:2796", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "name": "RHSA-2019:2861", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "name": "RHSA-2019:2925", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "RHSA-2019:2966", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3131", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "name": "RHSA-2019:2769", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "name": "RHSA-2019:3245", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "name": "RHSA-2019:3265", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "name": "RHSA-2019:3892", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "RHSA-2019:3906", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "name": "RHSA-2019:4018", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "name": "RHSA-2019:4019", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "name": "RHSA-2019:4021", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "name": "RHSA-2019:4020", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "name": "RHSA-2019:4045", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "name": "RHSA-2019:4042", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "name": "RHSA-2019:4040", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "name": "RHSA-2019:4041", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "name": "RHSA-2019:4269", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "name": "RHSA-2019:4273", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "name": "RHSA-2019:4352", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0406", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "name": "RHSA-2020:0727", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "USN-4308-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4308-1/" }, { "name": "[debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Jonathan Looney of Netflix for reporting this vulnerability." } ], "descriptions": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-08T23:06:27", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#605641", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "name": "DSA-4503", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4503" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K98053339" }, { "name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "openSUSE-SU-2019:2000", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "name": "FEDORA-2019-5a6a7bc12c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "20190825 [SECURITY] [DSA 4508-1] h2o security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "name": "DSA-4508", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4508" }, { "name": "openSUSE-SU-2019:2056", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "name": "openSUSE-SU-2019:2072", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "name": "FEDORA-2019-55d101a740", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "name": "FEDORA-2019-65db7ad6c7", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "name": "openSUSE-SU-2019:2085", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "name": "RHSA-2019:2682", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "name": "DSA-4520", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "RHSA-2019:2726", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "RHSA-2019:2594", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "openSUSE-SU-2019:2114", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "RHSA-2019:2661", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2690", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "name": "RHSA-2019:2766", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "name": "openSUSE-SU-2019:2130", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "name": "RHSA-2019:2796", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "name": "RHSA-2019:2861", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "name": "RHSA-2019:2925", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "RHSA-2019:2966", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3131", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "name": "RHSA-2019:2769", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "name": "RHSA-2019:3245", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "name": "RHSA-2019:3265", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "name": "RHSA-2019:3892", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "RHSA-2019:3906", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "name": "RHSA-2019:4018", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "name": "RHSA-2019:4019", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "name": "RHSA-2019:4021", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "name": "RHSA-2019:4020", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "name": "RHSA-2019:4045", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "name": "RHSA-2019:4042", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "name": "RHSA-2019:4040", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "name": "RHSA-2019:4041", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "name": "RHSA-2019:4269", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "name": "RHSA-2019:4273", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "name": "RHSA-2019:4352", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0406", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "name": "RHSA-2020:0727", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "USN-4308-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4308-1/" }, { "name": "[debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "HTTP/2 Ping Flood", "ASSIGNER": "cert@cert.org", "ID": "CVE-2019-9512", "STATE": "PUBLIC", "TITLE": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Jonathan Looney of Netflix for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "name": "DSA-4503", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4503" }, { "name": "https://support.f5.com/csp/article/K98053339", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K98053339" }, { "name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "openSUSE-SU-2019:2000", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "20190825 [SECURITY] [DSA 4508-1] h2o security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "name": "DSA-4508", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4508" }, { "name": "openSUSE-SU-2019:2056", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "name": "openSUSE-SU-2019:2072", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "name": "FEDORA-2019-55d101a740", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "name": "FEDORA-2019-65db7ad6c7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "name": "openSUSE-SU-2019:2085", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "name": "RHSA-2019:2682", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "name": "DSA-4520", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "RHSA-2019:2726", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "RHSA-2019:2594", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "RHSA-2019:2661", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2690", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "name": "RHSA-2019:2766", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "name": "openSUSE-SU-2019:2130", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "name": "RHSA-2019:2796", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "name": "RHSA-2019:2861", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "RHSA-2019:2966", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "name": "https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3131", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "name": "RHSA-2019:2769", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "name": "RHSA-2019:3245", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "name": "RHSA-2019:3265", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "name": "RHSA-2019:3892", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "RHSA-2019:3906", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "name": "RHSA-2019:4018", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "name": "RHSA-2019:4019", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "name": "RHSA-2019:4021", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "name": "RHSA-2019:4020", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "name": "RHSA-2019:4045", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "name": "RHSA-2019:4042", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "name": "RHSA-2019:4040", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "name": "RHSA-2019:4041", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "name": "RHSA-2019:4269", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "name": "RHSA-2019:4273", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "name": "RHSA-2019:4352", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0406", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "name": "RHSA-2020:0727", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "USN-4308-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4308-1/" }, { "name": "[debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2019-9512", "datePublished": "2019-08-13T20:50:59", "dateReserved": "2019-03-01T00:00:00", "dateUpdated": "2024-08-04T21:54:44.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-9512\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2019-08-13T21:15:12.287\",\"lastModified\":\"2023-11-07T03:13:41.880\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.\"},{\"lang\":\"es\",\"value\":\"Algunas implementaciones de HTTP / 2 son vulnerables a las inundaciones de ping, lo que puede conducir a una denegaci\u00f3n de servicio. El atacante env\u00eda pings continuos a un par HTTP / 2, haciendo que el par construya una cola interna de respuestas. Dependiendo de cu\u00e1n eficientemente se pongan en cola estos datos, esto puede consumir un exceso de CPU, memoria o ambos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"cret@cert.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.8},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"cret@cert.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndIncluding\":\"1.4.0\",\"matchCriteriaId\":\"93988E60-006B-434D-AB16-1FA1D2FEBC2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.12\",\"matchCriteriaId\":\"1D294D56-E784-4DA8-9C2C-BC5A05C92C0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.04\",\"matchCriteriaId\":\"65B1D2F6-BC1F-47AF-B4E6-4B50986AC622\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"6.2.3\",\"matchCriteriaId\":\"603BF43B-FC99-4039-A3C0-467F015A32FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndIncluding\":\"7.1.6\",\"matchCriteriaId\":\"07BB02CE-D4F2-459C-B0C6-FF78BF7996AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.0.3\",\"matchCriteriaId\":\"D875E0D8-D109-4F7F-A4C4-9EDD66CEE74E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.8.1\",\"matchCriteriaId\":\"74FB695D-2C76-47AB-988E-5629D2E695E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"8.9.0\",\"versionEndExcluding\":\"8.16.1\",\"matchCriteriaId\":\"CFC0252A-DF1D-4CF4-B450-27267227B599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.12.0\",\"matchCriteriaId\":\"25A3180B-21AF-4010-9DAB-41ADFD2D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"10.13.0\",\"versionEndExcluding\":\"10.16.3\",\"matchCriteriaId\":\"2EC65858-FF7B-4171-82EA-80942D426F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.8.1\",\"matchCriteriaId\":\"F522C500-AA33-4029-865F-F27FB00A354E\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Aug/16\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/08/20/1\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2594\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2661\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2682\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2690\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2726\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2766\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2769\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2796\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2861\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2925\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2939\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2955\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2966\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3131\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3245\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3265\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3892\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3906\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4018\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4019\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4020\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4021\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4040\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4041\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4042\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4045\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4269\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4273\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4352\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0406\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0727\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.cert.org/vuls/id/605641/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/24\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/31\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/43\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/18\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0001/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0004/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0005/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K98053339\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"cret@cert.org\"},{\"url\":\"https://usn.ubuntu.com/4308-1/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4503\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4508\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4520\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_33\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2020_1445
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.4.3 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1445", "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1445.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update", "tracking": { "current_release_date": "2024-11-05T22:03:48+00:00", "generator": { "date": "2024-11-05T22:03:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:1445", "initial_release_date": "2020-04-14T13:04:37+00:00", "revision_history": [ { "date": "2020-04-14T13:04:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-14T13:04:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T22:03:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ 7.4.3", "product": { "name": "Red Hat AMQ 7.4.3", "product_id": "Red Hat AMQ 7.4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
rhsa-2019_4040
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 6 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4040", "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11815", "url": "https://issues.redhat.com/browse/KEYCLOAK-11815" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4040.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 6", "tracking": { "current_release_date": "2024-11-05T21:38:17+00:00", "generator": { "date": "2024-11-05T21:38:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4040", "initial_release_date": "2019-12-02T17:04:39+00:00", "revision_history": [ { "date": "2019-12-02T17:04:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:38:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el6" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@4.8.15-1.Final_redhat_00001.1.el6sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@4.8.15-1.Final_redhat_00001.1.el6sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@4.8.15-1.Final_redhat_00001.1.el6sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "relates_to_product_reference": "6Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "relates_to_product_reference": "6Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 6 Server", "product_id": "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "relates_to_product_reference": "6Server-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID (service_account_name@placeholder.org) to some valid email ID (abc@gmail.com) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:39+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch", "6Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el6sso.src", "6Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el6sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019_4352
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Fuse 6.3 and Red Hat JBoss A-MQ 6.3.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Fuse provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat A-MQ is a standards compliant messaging system that is tailored for use in mission critical applications.\n\nThis patch is an update to Red Hat Fuse 6.3 and Red Hat A-MQ 6.3. It includes bug fixes, which are documented in the patch notes accompanying the package on the download page. See the download link given in the references section below.\n\nSecurity fix(es):\n\n* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) \n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (CVE-2019-10173)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4352", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq.broker\u0026downloadType=securityPatches\u0026version=6.3.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq.broker\u0026downloadType=securityPatches\u0026version=6.3.0" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index" }, { "category": "external", "summary": "1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4352.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix update", "tracking": { "current_release_date": "2024-11-05T21:41:50+00:00", "generator": { "date": "2024-11-05T21:41:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4352", "initial_release_date": "2019-12-19T17:37:50+00:00", "revision_history": [ { "date": "2019-12-19T17:37:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-19T17:37:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:41:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 6.3", "product": { "name": "Red Hat Fuse 6.3", "product_id": "Red Hat Fuse 6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0201", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715197" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.", "title": "Vulnerability description" }, { "category": "summary", "text": "zookeeper: Information disclosure in Apache ZooKeeper", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0201" }, { "category": "external", "summary": "RHBZ#1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201" } ], "release_date": "2019-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "workaround", "details": "Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]", "product_ids": [ "Red Hat Fuse 6.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zookeeper: Information disclosure in Apache ZooKeeper" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 6.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" } ] }
rhsa-2024_5856
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.1.7 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.6, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.1.7 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: EAP: field-name is not parsed in accordance to RFC7230 [eap-7.1.z] (CVE-2020-1710)\n\n* commons-beanutils: apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default [eap-7.1.z] (CVE-2019-10086)\n\n* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink [eap-7.1.z] (CVE-2022-23302)\n\n* jackson-databind: default typing mishandling leading to remote code execution [eap-7.1.z] (CVE-2019-14379)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth [eap-7.1.z] (CVE-2019-9514)\n\n* undertow: AJP File Read/Inclusion Vulnerability [eap-7.1.z] (CVE-2020-1745)\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service [eap-7.1.z] (CVE-2019-9511)\n\n* undertow: servletPath in normalized incorrectly leading to dangerous application mapping which could result in security bypass [eap-7.1.z] (CVE-2020-1757)\n\n* undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS [eap-7.1.z] (CVE-2019-14888)\n\n* log4j: Unsafe deserialization flaw in Chainsaw log viewer [eap-7.1.z] (CVE-2022-23307)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header [eap-7.1.z] (CVE-2019-20445)\n\n* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender [eap-7.1.z] (CVE-2021-4104)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth [eap-7.1.z] (CVE-2019-9515)\n\n* infinispan-core: infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods [eap-7.1.z] (CVE-2019-10174)\n\n* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender [eap-7.1.z] (CVE-2022-23305)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution [eap-7.1.z] (CVE-2019-12384)\n\n* wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:5856", "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1752770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752770" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "1793970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793970" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1807305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807305" }, { "category": "external", "summary": "2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "2041949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949" }, { "category": "external", "summary": "2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "JBEAP-24826", "url": "https://issues.redhat.com/browse/JBEAP-24826" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5856.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.7 on RHEL 7 security update", "tracking": { "current_release_date": "2024-11-06T06:46:28+00:00", "generator": { "date": "2024-11-06T06:46:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2024:5856", "initial_release_date": "2024-08-26T11:05:47+00:00", "revision_history": [ { "date": "2024-08-26T11:05:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-26T11:05:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T06:46:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product_id": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@1.4.18-12.SP12_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-netty@4.1.45-1.Final_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.1.13-1.Final_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product_id": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-commons-beanutils@1.9.4-1.redhat_00002.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product_id": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-infinispan@8.2.11-1.SP2_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product_id": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jackson-databind@2.8.11.5-1.redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-log4j-jboss-logmanager@1.2.2-1.Final_redhat_00002.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product_id": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.1.7-2.GA_redhat_00002.1.ep7.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@1.4.18-12.SP12_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-netty@4.1.45-1.Final_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-netty-all@4.1.45-1.Final_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.1.13-1.Final_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-commons-beanutils@1.9.4-1.redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-infinispan@8.2.11-1.SP2_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-jdbc@8.2.11-1.SP2_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-remote@8.2.11-1.SP2_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-infinispan-client-hotrod@8.2.11-1.SP2_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-infinispan-commons@8.2.11-1.SP2_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-infinispan-core@8.2.11-1.SP2_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jackson-databind@2.8.11.5-1.redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-log4j-jboss-logmanager@1.2.2-1.Final_redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.1.7-2.GA_redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.1.7-2.GA_redhat_00002.1.ep7.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" }, { "acknowledgments": [ { "names": [ "Henning Baldersheim", "H\u00e5vard Pettersen" ], "organization": "Verizon Media" } ], "cve": "CVE-2019-14888", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772464" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Undertow HTTP server listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14888" }, { "category": "external", "summary": "RHBZ#1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888" } ], "release_date": "2020-01-20T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Enable HTTP2 (enable-http2=\"true\") in the undertow\u0027s HTTPS settings.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775293" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17531" }, { "category": "external", "summary": "RHBZ#1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17531", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531" } ], "release_date": "2019-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1710", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "discovery_date": "2019-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793970" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in JBoss EAP, where it does not process the header field-name in accordance with RFC7230. Whitespace between the header field-name and colon is processed, resulting in an HTTP response code of 200 instead of a bad request of 400.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: field-name is not parsed in accordance to RFC7230", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1710" }, { "category": "external", "summary": "RHBZ#1793970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1710", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1710" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "There is currently no known mitigation for this issue.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "EAP: field-name is not parsed in accordance to RFC7230" }, { "acknowledgments": [ { "names": [ "Steve Zapantis", "Robert Roberson", "taktakdb4g" ] } ], "cve": "CVE-2020-1745", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-02-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1807305" } ], "notes": [ { "category": "description", "text": "A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: AJP File Read/Inclusion Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251 and CVE page https://access.redhat.com/security/cve/cve-2020-1938", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1745" }, { "category": "external", "summary": "RHBZ#1807305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1745", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1745" }, { "category": "external", "summary": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/", "url": "https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/" }, { "category": "external", "summary": "https://www.cnvd.org.cn/webinfo/show/5415", "url": "https://www.cnvd.org.cn/webinfo/show/5415" }, { "category": "external", "summary": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487", "url": "https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487" } ], "release_date": "2020-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "Please refer to the Red Hat knowledgebase article: https://access.redhat.com/solutions/4851251", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: AJP File Read/Inclusion Vulnerability" }, { "acknowledgments": [ { "names": [ "Fedorov Oleksii", "Keitaro Yamazaki", "Shiga Ryota" ], "organization": "LINE Corporation" } ], "cve": "CVE-2020-1757", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752770" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow, where the servlet container causes the servletPath to normalize incorrectly by truncating the path after the semicolon. The flaw may lead to application mapping, resulting in a security bypass.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1757" }, { "category": "external", "summary": "RHBZ#1752770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1757", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1757" } ], "release_date": "2018-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "The issue can be mitigated by configuring UrlPathHelper to ignore the servletPath via setting \"alwaysUseFullPath\".", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass" }, { "cve": "CVE-2021-4104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031667" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSAppender in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if the deployed application is configured to use JMSAppender and to the attacker\u0027s JNDI LDAP endpoint.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Based on the conditions to be exploitable (see details below), the risk is much lower than Log4j 2.x and Red Hat has assessed this to be Moderate severity. This flaw has been filed for Log4j 1.x, and the corresponding flaw information for Log4j 2.x is available at: https://access.redhat.com/security/cve/CVE-2021-44228\n\nNote this flaw ONLY affects applications which are specifically configured to use JMSAppender, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSAppender to the attacker\u0027s JNDI LDAP endpoint. \n\nIf the Log4j configuration is set TopicBindingName or TopicConnectionFactoryBindingName configurations allowing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228 Log4j 2.x, Log4j 1.x is vulnerable. However, the attack vector is reduced as it depends on having write access, which is not a standard configuration rather than untrusted user input. These are sufficient factors beyond the attacker\u0027s control.\n\nThe tomcat package shipped with Red Hat Enterprise Linux does not include log4j but it does include a default configuration for log4j, log4j.properties, which could be used with tomcat if users choose to install and configure the library. The JMSAppender is not enabled by default, and the permissions of the file can only be modified as root.\n\nRed Hat Virtualization ships log4j12-1.2.17, but it is used and configured in a way which makes this flaw not possible to exploit. Therefore impact is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4104" }, { "category": "external", "summary": "RHBZ#2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "RHSB-2021-009", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301" }, { "category": "external", "summary": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx", "url": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/12/13/1", "url": "https://www.openwall.com/lists/oss-security/2021/12/13/1" } ], "release_date": "2021-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JMSAppender in the Log4j configuration if it is used\n- Remove the JMSAppender class from the classpath. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/net/JMSAppender.class\n```\n- Restrict access for the OS user on the platform running the application to prevent modifying the Log4j configuration by the attacker.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender" }, { "cve": "CVE-2022-23302", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041949" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSSink in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if JMSSink is deployed and has been configured to perform JNDI requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink", "title": "Vulnerability summary" }, { "category": "other", "text": "Note this flaw ONLY affects applications which are specifically configured to use JMSSink, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSSink to the attacker\u0027s JNDI LDAP endpoint.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization and OpenShift Container Platform in the OCP Metering stack (the Hive/Presto/Hadoop components) ship a vulnerable version of the log4j package, however JMSSink is not used. Therefore the impact of this vulnerability for these products is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23302" }, { "category": "external", "summary": "RHBZ#2041949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23302" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23302" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/3", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/3" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JMSSink in the Log4j configuration if it is used\n- Remove the JMSSink class from the server\u0027s jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/net/JMSSink.class\n```\n- Restrict access for the OS user on the platform running the application to prevent modifying the Log4j configuration by the attacker.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink" }, { "cve": "CVE-2022-23305", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041959" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JDBCAppender in Log4j 1.x is vulnerable to SQL injection in untrusted data. This allows a remote attacker to run SQL statements in the database if the deployed application is configured to use JDBCAppender with certain interpolation tokens.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization and OpenShift Container Platform in the OCP Metering stack (the Hive/Presto/Hadoop components) ship a vulnerable version of the log4j package, however JDBCAppender is not used. Therefore the impact of this vulnerability for these products is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23305" }, { "category": "external", "summary": "RHBZ#2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/4", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/4" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JDBCAppender in the Log4j configuration if it is used\n- Remove the JDBCAppender class from the server\u0027s jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/jdbc/JDBCAppender.class\n```", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender" }, { "cve": "CVE-2022-23307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041967" } ], "notes": [ { "category": "description", "text": "A flaw was found in the log4j 1.x chainsaw component, where the contents of certain log entries are deserialized and possibly permit code execution. This flaw allows an attacker to send a malicious request with serialized data to the server to be deserialized when the chainsaw component is run.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Unsafe deserialization flaw in Chainsaw log viewer", "title": "Vulnerability summary" }, { "category": "other", "text": "Chainsaw is a standalone graphical user interface for viewing log entries in log4j. This flaw may be bypassed by using other available means to access log entries.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization ships a vulnerable version of the log4j package, however chainsaw is not part of typical use cases. An attacker looking to exploit this would need to not only be able to generate a malicious log entry, but also have the necessary access and permissions to start chainsaw on the engine node. Therefore the impact of this vulnerability for Red Hat Virtualization is rated Low.\n\nSimilar to Red Hat Virtualization in OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of log4j package, however vulnerable chainsaw component is not used by default. Therefore the impact to OCP is reduced to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23307" }, { "category": "external", "summary": "RHBZ#2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/5", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/5" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-26T11:05:47+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "category": "workaround", "details": "These are the mitigations available for this flaw for log4j 1.x:\n- Avoid using Chainsaw to view logs, and instead use some other utility, especially if there is a log view available within the product itself.\n- Remove the Chainsaw classes from the log4j jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/chainsaw/*\n```\n(log4j jars may be nested in zip archives within product)", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-commons-beanutils-0:1.9.4-1.redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-jdbc-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-cachestore-remote-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-client-hotrod-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-commons-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-infinispan-core-0:8.2.11-1.SP2_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.5-1.redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-netty-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-netty-all-0:4.1.45-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-12.SP12_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-elytron-0:1.1.13-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.7-2.GA_redhat_00002.1.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-1.Final_redhat_00002.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: Unsafe deserialization flaw in Chainsaw log viewer" } ] }
rhsa-2020_0727
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat Data Grid is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Data Grid is a distributed, in-memory, NoSQL datastore based on the Infinispan project.\n\nThis release of Red Hat Data Grid 7.3.3 serves as a replacement for Red Hat Data Grid 7.3.2 and includes bug fixes and enhancements, which are described in the Release Notes, linked to in the References section of this erratum.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* h2: Information Exposure due to insecure handling of permissions in the backup (CVE-2018-14335)\n\n* wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files (CVE-2019-10212)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0727", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=patches\u0026version=7.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=patches\u0026version=7.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index" }, { "category": "external", "summary": "1610877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610877" }, { "category": "external", "summary": "1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1731984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731984" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0727.json" } ], "title": "Red Hat Security Advisory: Red Hat Data Grid 7.3.3 security update", "tracking": { "current_release_date": "2024-11-05T21:52:02+00:00", "generator": { "date": "2024-11-05T21:52:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:0727", "initial_release_date": "2020-03-05T12:53:27+00:00", "revision_history": [ { "date": "2020-03-05T12:53:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-05T12:53:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:52:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Data Grid 7.3.3", "product": { "name": "Red Hat Data Grid 7.3.3", "product_id": "Red Hat Data Grid 7.3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:7.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Data Grid" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14335", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610877" } ], "notes": [ { "category": "description", "text": "An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Information Exposure due to insecure handling of permissions in the backup", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14335" }, { "category": "external", "summary": "RHBZ#1610877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14335", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14335" } ], "release_date": "2018-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "h2: Information Exposure due to insecure handling of permissions in the backup" }, { "acknowledgments": [ { "names": [ "Daniel Le Gall" ], "organization": "SCRT Information Security" } ], "cve": "CVE-2019-3805", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "discovery_date": "2018-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660263" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3805" }, { "category": "external", "summary": "RHBZ#1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805" } ], "release_date": "2019-04-30T17:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10212", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1731984" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user\u2019s credentials from the log files.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files", "title": "Vulnerability summary" }, { "category": "other", "text": "All the Red Hat products using the undertow-core jar version 2.0.20 or before are affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10212" }, { "category": "external", "summary": "RHBZ#1731984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10212", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10212" } ], "release_date": "2019-09-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "Use Elytron instead of legacy Security subsystem.", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" } ] }
rhsa-2019_2861
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for gRPC, included in sriov-network-device-plugin-container, is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains updates gRPC in the sriov-network-device-plugin container in Red Hat OpenShift Container Platform 4.1.18.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2861", "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2861.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.18 gRPC security update", "tracking": { "current_release_date": "2024-11-05T21:26:49+00:00", "generator": { "date": "2024-11-05T21:26:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2861", "initial_release_date": "2019-09-26T17:19:31+00:00", "revision_history": [ { "date": "2019-09-26T17:19:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-26T17:19:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:26:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.1.18-201909201915" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-26T17:19:31+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.18, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4493f9c75d46ecfcee81bbb0ca9c2579bac4ffb150b2255f8385eac50a885ca6_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
rhsa-2020_2565
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "This is a security update for JBoss EAP Continuous Delivery 18.0.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform CD18 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform CD18 includes bug fixes and enhancements. \n\nSecurity Fix(es):\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n* wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n* undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely (CVE-2019-19343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2565", "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1780445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780445" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2565.json" } ], "title": "Red Hat Security Advisory: EAP Continuous Delivery Technical Preview Release 18 security update", "tracking": { "current_release_date": "2024-11-05T22:20:37+00:00", "generator": { "date": "2024-11-05T22:20:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:2565", "initial_release_date": "2020-06-15T16:17:24+00:00", "revision_history": [ { "date": "2020-06-15T16:17:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-15T16:17:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T22:20:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product": { "name": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product_id": "Red Hat JBoss Enterprise Application Platform Continuous Delivery", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_cd:18" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Daniel Le Gall" ], "organization": "SCRT Information Security" } ], "cve": "CVE-2019-3805", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "discovery_date": "2018-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660263" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3805" }, { "category": "external", "summary": "RHBZ#1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805" } ], "release_date": "2019-04-30T17:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-19343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1780445" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow when using Remoting as shipped in Red Hat Jboss EAP before version 7.2.4. A memory leak in HttpOpenListener due to holding remote connections indefinitely may lead to denial of service. Versions before undertow 2.0.25.SP1 and jboss-remoting 5.0.14.SP1 are believed to be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19343" }, { "category": "external", "summary": "RHBZ#1780445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19343", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19343" } ], "release_date": "2019-12-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Undertow: Memory Leak in Undertow HttpOpenListener due to holding remoting connections indefinitely" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-15T16:17:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nYou must restart the JBoss server process for the update to take effect.\n\nThe References section of this erratum contains a download link (you must log in to download the update)", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2565" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform Continuous Delivery" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" } ] }
rhsa-2019_3265
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the ansible-operator, apb, containernetworking-plugins, golang-github-openshift-prometheus-alert-buffer, golang-github-prometheus-promu and openshift-eventrouter RPM packages for Red Hat OpenShift Container Platform 4.1.21. These packages have been rebuilt with an updated version of Go to address the below security issues.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3265", "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3265.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1 security update", "tracking": { "current_release_date": "2024-11-05T21:31:12+00:00", "generator": { "date": "2024-11-05T21:31:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:3265", "initial_release_date": "2019-10-30T18:20:03+00:00", "revision_history": [ { "date": "2019-10-30T18:20:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-30T18:20:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:31:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.x86_64", "product": { "name": "apb-0:2.0.3-2.el7.x86_64", "product_id": "apb-0:2.0.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@2.0.3-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0-5.git85ceabc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0-5.git85ceabc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product_id": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-3.gited73fb6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-3.gited73fb6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product_id": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-operator@0.0.1-3.git.59.4beb3d2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.src", "product": { "name": "apb-0:2.0.3-2.el7.src", "product_id": "apb-0:2.0.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@2.0.3-2.el7?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-4.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0-5.git85ceabc.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product_id": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-3.gited73fb6.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product_id": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-operator@0.0.1-3.git.59.4beb3d2.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_id": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb-container-scripts@2.0.3-2.el7?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:2.0.3-2.el7.noarch", "product": { "name": "apb-devel-0:2.0.3-2.el7.noarch", "product_id": "apb-devel-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb-devel@2.0.3-2.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product": { "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_id": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-operator-container-scripts@0.0.1-3.git.59.4beb3d2.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product": { "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_id": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-operator-devel@0.0.1-3.git.59.4beb3d2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src" }, "product_reference": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64" }, "product_reference": "ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch" }, "product_reference": "ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch" }, "product_reference": "ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src" }, "product_reference": "apb-0:2.0.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64" }, "product_reference": "apb-0:2.0.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-container-scripts-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-devel-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src" }, "product_reference": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-30T18:20:03+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3265" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-30T18:20:03+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.21, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3265" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-operator-0:0.0.1-3.git.59.4beb3d2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-operator-container-scripts-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-operator-devel-0:0.0.1-3.git.59.4beb3d2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.1:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-4.1:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.src", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-eventrouter-debuginfo-0:0.2-3.gited73fb6.el7.x86_64", "7Server-RH7-RHOSE-4.1:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_4041
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4041", "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11816", "url": "https://issues.redhat.com/browse/KEYCLOAK-11816" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4041.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 7", "tracking": { "current_release_date": "2024-11-05T21:38:24+00:00", "generator": { "date": "2024-11-05T21:38:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4041", "initial_release_date": "2019-12-02T17:04:03+00:00", "revision_history": [ { "date": "2019-12-02T17:04:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:38:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el7" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@4.8.15-1.Final_redhat_00001.1.el7sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@4.8.15-1.Final_redhat_00001.1.el7sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@4.8.15-1.Final_redhat_00001.1.el7sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "relates_to_product_reference": "7Server-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID (service_account_name@placeholder.org) to some valid email ID (abc@gmail.com) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:03+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el7sso.src", "7Server-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhba-2019_2819
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.1.17 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat\nOpenShift Container Platform 4.1.17. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:2820\n\nAll OpenShift Container Platform 4.1 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:2819", "url": "https://access.redhat.com/errata/RHBA-2019:2819" }, { "category": "external", "summary": "1751890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751890" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_2819.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.1.17 packages update", "tracking": { "current_release_date": "2024-11-05T15:54:53+00:00", "generator": { "date": "2024-11-05T15:54:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHBA-2019:2819", "initial_release_date": "2019-09-25T06:26:23+00:00", "revision_history": [ { "date": "2019-09-25T06:26:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-25T06:26:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T15:54:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.17-201909170941.git.1.9b9b46b.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.1.17-201909170941.git.1.9b9b46b.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.1.17-201909170941.git.0.2447974.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.17-201909170941.git.0.2447974.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_id": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.1.17-201909170941.git.0.2447974.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product": { "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product_id": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker@1.4.4-2.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.1.17-201909170941.git.0.2447974.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.17-201909170941.git.0.2447974.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_id": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.1.17-201909170941.git.0.2447974.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.0.2-2.dev.git96ccc2e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.0.2-2.dev.git96ccc2e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product": { "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_id": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.0.2-2.dev.git96ccc2e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.32-5.git1715c90.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.32-5.git1715c90.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.32-5.git1715c90.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product_id": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.32-5.git1715c90.el8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.17-201909170941.git.1.9b9b46b.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product_id": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.1.17-201909170941.git.0.2447974.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product_id": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.1.17-201909170941.git.162.79c271c.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-service-broker-1:1.4.4-2.el7.src", "product": { "name": "ansible-service-broker-1:1.4.4-2.el7.src", "product_id": "ansible-service-broker-1:1.4.4-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker@1.4.4-2.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product_id": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.1.17-201909170941.git.0.2447974.el8?arch=src" } } }, { "category": "product_version", "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product_id": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.0.2-2.dev.git96ccc2e.el8?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product_id": "skopeo-1:0.1.32-5.git1715c90.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.32-5.git1715c90.el8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product_id": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.1.17-201909170941.git.162.79c271c.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product": { "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product_id": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker-container-scripts@1.4.4-2.el7?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product": { "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product_id": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker-selinux@1.4.4-2.el7?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product": { "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product_id": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/automation-broker-apb-role@1.4.4-2.el7?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product": { "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product_id": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@1.0.2-2.dev.git96ccc2e.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-1:1.4.4-2.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src" }, "product_reference": "ansible-service-broker-1:1.4.4-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-1:1.4.4-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64" }, "product_reference": "ansible-service-broker-1:1.4.4-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch" }, "product_reference": "ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch" }, "product_reference": "ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "automation-broker-apb-role-1:1.4.4-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" }, "product_reference": "automation-broker-apb-role-1:1.4.4-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src" }, "product_reference": "openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch" }, "product_reference": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src" }, "product_reference": "openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src" }, "product_reference": "openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src" }, "product_reference": "podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64" }, "product_reference": "podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch" }, "product_reference": "podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src" }, "product_reference": "skopeo-1:0.1.32-5.git1715c90.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-25T06:26:23+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nFor OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.17, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:2819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.17-201909170941.git.1.9b9b46b.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el7.src", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.noarch", "7Server-RH7-RHOSE-4.1:openshift-ansible-0:4.1.17-201909170941.git.162.79c271c.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el7.x86_64", "8Base-RHOSE-4.1:containers-common-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.17-201909170941.git.0.2447974.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.17-201909170941.git.0.2447974.el8.x86_64", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.src", "8Base-RHOSE-4.1:podman-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debuginfo-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-debugsource-0:1.0.2-2.dev.git96ccc2e.el8.x86_64", "8Base-RHOSE-4.1:podman-docker-0:1.0.2-2.dev.git96ccc2e.el8.noarch", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.src", "8Base-RHOSE-4.1:skopeo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debuginfo-1:0.1.32-5.git1715c90.el8.x86_64", "8Base-RHOSE-4.1:skopeo-debugsource-1:0.1.32-5.git1715c90.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-25T06:26:23+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nFor OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.17, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:2819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.src", "7Server-RH7-RHOSE-4.1:ansible-service-broker-1:1.4.4-2.el7.x86_64", "7Server-RH7-RHOSE-4.1:ansible-service-broker-container-scripts-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:ansible-service-broker-selinux-1:1.4.4-2.el7.noarch", "7Server-RH7-RHOSE-4.1:automation-broker-apb-role-1:1.4.4-2.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_2726
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Failure trying to conntect to image registry using TLS when buildah is compiled with FIPS mode (BZ#1743169)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2726", "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1743169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743169" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2726.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update", "tracking": { "current_release_date": "2024-11-05T21:23:57+00:00", "generator": { "date": "2024-11-05T21:23:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2726", "initial_release_date": "2019-09-12T12:29:22+00:00", "revision_history": [ { "date": "2019-09-12T12:29:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T12:29:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:23:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8000120190828225436:14bc675c", "product": { "name": "go-toolset:rhel8:8000120190828225436:14bc675c", "product_id": "go-toolset:rhel8:8000120190828225436:14bc675c", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8000120190828225436:14bc675c" } } }, { "category": "product_version", "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product": { "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_id": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.11.13-1.module%2Bel8.0.1%2B4087%2Bd8180914?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.11.13-1.module%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product": { "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_id": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.11.13-1.module%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.11.13-1.module%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product_id": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.11.13-1.module%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_id": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_id": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.11.13-2.module%2Bel8.0.1%2B4087%2Bd8180914?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, "product_reference": "go-toolset:rhel8:8000120190828225436:14bc675c", "relates_to_product_reference": "AppStream-8.0.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64 as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64" }, "product_reference": "golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch as a component of go-toolset:rhel8:8000120190828225436:14bc675c as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" }, "product_reference": "golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "relates_to_product_reference": "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T12:29:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T12:29:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:go-toolset-0:1.11.13-1.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.src", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.aarch64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.ppc64le", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.s390x", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-bin-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-docs-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-misc-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-race-0:1.11.13-2.module+el8.0.1+4087+d8180914.x86_64", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-src-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch", "AppStream-8.0.1.Z:go-toolset:rhel8:8000120190828225436:14bc675c:golang-tests-0:1.11.13-2.module+el8.0.1+4087+d8180914.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2020_0983
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.5 to 7.6) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added; also added golang CVE descriptions that were unintentionally ommitted from the original publication]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.6.0 serves as a replacement for Red Hat Fuse 7.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* golang: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* golang: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* undertow: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* undertow: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* undertow: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* spring-security-core: mishandling of user passwords allows logging in with a password of NULL (CVE-2019-11272)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)\n\n* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)\n\n* logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)\n\n* js-jquery: XSS in responses from cross-origin ajax requests (CVE-2017-16012)\n\n* apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip (CVE-2018-11771)\n\n* spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher (CVE-2019-3802)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* shiro: Cookie padding oracle vulnerability with default configuration (CVE-2019-12422)\n\n* jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. (CVE-2019-12814)\n\n* jackson-databind: Polymorphic typing issue related to logback/JNDI (CVE-2019-14439)\n\n* springframework: DoS Attack via Range Requests (CVE-2018-15756)\n\n* c3p0: loading XML configuration leads to denial of service (CVE-2019-5427)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0983", "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/" }, { "category": "external", "summary": "1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0983.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.6.0 security update", "tracking": { "current_release_date": "2024-11-05T21:56:36+00:00", "generator": { "date": "2024-11-05T21:56:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:0983", "initial_release_date": "2020-03-26T15:46:59+00:00", "revision_history": [ { "date": "2020-03-26T15:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:19:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:56:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.6.0", "product": { "name": "Red Hat Fuse 7.6.0", "product_id": "Red Hat Fuse 7.6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9251", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1399546" } ], "notes": [ { "category": "description", "text": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting via cross-domain ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-9251" }, { "category": "external", "summary": "RHBZ#1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-9251", "url": "https://www.cve.org/CVERecord?id=CVE-2015-9251" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" } ], "release_date": "2015-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting via cross-domain ajax requests" }, { "cve": "CVE-2017-5929", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1432858" } ], "notes": [ { "category": "description", "text": "It was found that logback is vulnerable to a deserialization issue. Logback can be configured to allow remote logging through SocketServer/ServerSocketReceiver interfaces that can accept untrusted serialized data. Authenticated attackers on the adjacent network can leverage this vulnerability to execute arbitrary code through deserialization of custom gadget chains.", "title": "Vulnerability description" }, { "category": "summary", "text": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5929" }, { "category": "external", "summary": "RHBZ#1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5929", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929" } ], "release_date": "2017-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver" }, { "cve": "CVE-2017-16012", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1591854" } ], "notes": [ { "category": "description", "text": "No description is available for this CVE.", "title": "Vulnerability description" }, { "category": "summary", "text": "js-jquery: XSS in responses from cross-origin ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16012" }, { "category": "external", "summary": "RHBZ#1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16012", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16012" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012" } ], "release_date": "2017-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "js-jquery: XSS in responses from cross-origin ajax requests" }, { "cve": "CVE-2018-11771", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618573" } ], "notes": [ { "category": "description", "text": "When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17\u0027s ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress\u0027 zip package.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11771" }, { "category": "external", "summary": "RHBZ#1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11771", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E", "url": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E" } ], "release_date": "2018-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip" }, { "cve": "CVE-2018-12536", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2018-06-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1597418" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn\u0027t match a dynamic url-pattern, and is eventually handled by the DefaultServlet\u0027s static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: full server path revealed when using the default Error Handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12536" }, { "category": "external", "summary": "RHBZ#1597418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12536", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536" } ], "release_date": "2018-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Information disclosure occurs when java.nio.file.InvalidPathException occurs and is handled by the default Jetty error handler. To protect against this, a custom error handler can be configured for that particular error or for a larger set of errors according to the documentation link below. Red Hat Product Security advises that production deployments on Jetty use custom error handlers to limit the information disclosed and to ensure effective logging of error conditions.\n\nhttp://www.eclipse.org/jetty/documentation/current/custom-error-pages.html", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: full server path revealed when using the default Error Handling" }, { "cve": "CVE-2018-15756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1643043" } ], "notes": [ { "category": "description", "text": "Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: DoS Attack via Range Requests", "title": "Vulnerability summary" }, { "category": "other", "text": "The package rhvm-dependencies does not include the vulnerable spring-webmvc component.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-15756" }, { "category": "external", "summary": "RHBZ#1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-15756", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15756" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2018-15756", "url": "https://pivotal.io/security/cve-2018-15756" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "springframework: DoS Attack via Range Requests" }, { "cve": "CVE-2019-3802", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730316" } ], "notes": [ { "category": "description", "text": "This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3802" }, { "category": "external", "summary": "RHBZ#1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-3802", "url": "https://pivotal.io/security/cve-2019-3802" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "cve": "CVE-2019-5427", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2019-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709860" } ], "notes": [ { "category": "description", "text": "c3p0 version \u003c 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "c3p0: loading XML configuration leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not vulnerable to this issue, because the candlepin component who uses the c3p0 jar never passes a XML configuration file to c3p0, even though it includes a vulnerable version of the latter. Since this issue requires a XML files to be loaded by c3p0, an exploitation path doesn\u0027t exist.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5427" }, { "category": "external", "summary": "RHBZ#1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5427", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427" } ], "release_date": "2019-04-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "c3p0: loading XML configuration leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-11272", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1728993" } ], "notes": [ { "category": "description", "text": "A flaw was found in Spring Security in several versions, in the use of plain text passwords using the PlaintextPasswordEncoder. If an application is using an affected version of Spring Security with the PlaintextPasswordEncoder and a user has a null encoded password, an attacker can use this flaw to authenticate using a password of \"null.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight versions 9 and 10 contain the vulnerable code. However, these OpenDaylight versions were released as technical preview with limited support and will therefore not be updated. Other OpenDaylight versions do not contain the vulnerable library.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11272" }, { "category": "external", "summary": "RHBZ#1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11272", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-11272", "url": "https://pivotal.io/security/cve-2019-11272" } ], "release_date": "2019-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" }, { "cve": "CVE-2019-12422", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774726" } ], "notes": [ { "category": "description", "text": "Apache Shiro before 1.4.2, when using the default \"remember me\" configuration, cookies could be susceptible to a padding attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "shiro: Cookie padding oracle vulnerability with default configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12422" }, { "category": "external", "summary": "RHBZ#1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shiro: Cookie padding oracle vulnerability with default configuration" }, { "cve": "CVE-2019-12814", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725795" } ], "notes": [ { "category": "description", "text": "A new polymorphic typing flaw was discovered in FasterXML jackson-databind, versions 2.x through 2.9.9. With default typing enabled, an attacker can send a specifically crafted JSON message to the server that allows them to read arbitrary local files.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.", "title": "Vulnerability summary" }, { "category": "other", "text": "* Red Hat Satellite 6 does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability. \n* Red Hat OpenStack\u0027s OpenDaylight does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12814" }, { "category": "external", "summary": "RHBZ#1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814" } ], "release_date": "2019-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "This vulnerability relies on jdom (org.jdom) or jdom2 (org.jdom2) being present in the application\u0027s ClassPath. Applications using jackson-databind that do not also use jdom or jdom2 are not impacted by this vulnerability.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message." }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2019-14439", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752962" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Polymorphic typing issue related to logback/JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenDaylight provided as part of Red Hat OpenStack does not utilize logback when used in a supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14439" }, { "category": "external", "summary": "RHBZ#1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14439", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439" } ], "release_date": "2019-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Polymorphic typing issue related to logback/JNDI" }, { "acknowledgments": [ { "names": [ "Guillaume Teissier" ], "organization": "Orange" } ], "cve": "CVE-2019-17570", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775193" } ], "notes": [ { "category": "description", "text": "A flaw was discovered where the XMLRPC client implementation in Apache XMLRPC, performed deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious or compromised XMLRPC server could possibly use this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library.", "title": "Vulnerability description" }, { "category": "summary", "text": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 provides vulnerable version of xmlrpc via the Optional repository. As the Optional repository is not supported, this issue is not planned to be addressed there.\n\nRed Hat Virtualization Manager uses xmlrpc only for internal communication with the scheduler. Since this is a component of the Manager itself, it is not subject to attacker influence and does not represent an attack surface.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17570" }, { "category": "external", "summary": "RHBZ#1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17570", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17570" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570" }, { "category": "external", "summary": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp", "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the Apache XMLRPC client library from sending requests to untrusted XMLRPC servers.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response" } ] }
rhsa-2020_0406
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 7 Extras.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0406", "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0406.json" } ], "title": "Red Hat Security Advisory: containernetworking-plugins security update", "tracking": { "current_release_date": "2024-11-05T21:46:50+00:00", "generator": { "date": "2024-11-05T21:46:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:0406", "initial_release_date": "2020-02-04T19:25:46+00:00", "revision_history": [ { "date": "2020-02-04T19:25:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-02-04T19:25:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:46:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7 Extras", "product": { "name": "Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_other:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Extras" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-4.el7_7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.1-4.el7_7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-4.el7_7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-4.el7_7?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.1-4.el7_7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product_id": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-4.el7_7?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.1-4.el7_7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Server-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.src as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.src", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64 as a component of Red Hat Enterprise Linux 7 Extras", "product_id": "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "relates_to_product_reference": "7Workstation-EXTRAS-7.7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-02-04T19:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0406" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-02-04T19:25:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0406" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Server-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Server-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.src", "7Workstation-EXTRAS-7.7:containernetworking-plugins-0:0.8.1-4.el7_7.x86_64", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.ppc64le", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.s390x", "7Workstation-EXTRAS-7.7:containernetworking-plugins-debuginfo-0:0.8.1-4.el7_7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_4045
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat Single Sign-On 7.3 from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 serves as a replacement for Red Hat Single Sign-On 7.2.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth\n(CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory\ngrowth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory\ngrowth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027\nuser by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass\n(CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4045", "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11792", "url": "https://issues.redhat.com/browse/KEYCLOAK-11792" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4045.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update", "tracking": { "current_release_date": "2024-11-05T21:38:35+00:00", "generator": { "date": "2024-11-05T21:38:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4045", "initial_release_date": "2019-12-02T17:21:07+00:00", "revision_history": [ { "date": "2019-12-02T17:21:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:21:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:38:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3", "product": { "name": "Red Hat Single Sign-On 7.3", "product_id": "Red Hat Single Sign-On 7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_single_sign_on:7.3" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID (service_account_name@placeholder.org) to some valid email ID (abc@gmail.com) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "Red Hat Single Sign-On 7.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:21:07+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "Red Hat Single Sign-On 7.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Single Sign-On 7.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019_2817
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for cri-o is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure (CVE-2019-10214)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 3.11 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2817", "url": "https://access.redhat.com/errata/RHSA-2019:2817" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1732508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732508" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2817.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 security update", "tracking": { "current_release_date": "2024-11-05T21:25:28+00:00", "generator": { "date": "2024-11-05T21:25:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2817", "initial_release_date": "2019-09-23T20:37:17+00:00", "revision_history": [ { "date": "2019-09-23T20:37:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-23T20:37:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:25:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_id": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product_id": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" }, "product_reference": "cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Miloslav Trma\u010d" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-10214", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2019-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732508" } ], "notes": [ { "category": "description", "text": "The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.", "title": "Vulnerability description" }, { "category": "summary", "text": "containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10214" }, { "category": "external", "summary": "RHBZ#1732508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10214", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10214" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10214", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10214" } ], "release_date": "2019-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-23T20:37:17+00:00", "details": "See the following documentation, which will be updated shortly for release\n3.11.146, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2817" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.src", "7Server-RH7-RHOSE-3.11:cri-o-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-o-debuginfo-0:1.11.16-0.2.dev.rhaos3.11.git3f89eba.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containers/image: not enforcing TLS when sending username+password credentials to token servers leading to credential disclosure" } ] }
rhsa-2019_2682
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset-1.11 and go-toolset-1.11-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2682", "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2682.json" } ], "title": "Red Hat Security Advisory: go-toolset-1.11 and go-toolset-1.11-golang security update", "tracking": { "current_release_date": "2024-11-05T21:23:26+00:00", "generator": { "date": "2024-11-05T21:23:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2682", "initial_release_date": "2019-09-10T17:47:41+00:00", "revision_history": [ { "date": "2019-09-10T17:47:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-10T17:47:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:23:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2019" } } } ], "category": "product_family", "name": "Red Hat Developer Tools" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang@1.11.13-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-bin@1.11.13-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-misc@1.11.13-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-race@1.11.13-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-src@1.11.13-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-tests@1.11.13-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11@1.11.13-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-build@1.11.13-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-runtime@1.11.13-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-scldevel@1.11.13-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang@1.11.13-2.el7?arch=src" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.src", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11@1.11.13-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product_id": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-docs@1.11.13-2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang@1.11.13-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-bin@1.11.13-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-misc@1.11.13-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-src@1.11.13-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-tests@1.11.13-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11@1.11.13-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-build@1.11.13-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-runtime@1.11.13-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-scldevel@1.11.13-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang@1.11.13-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-bin@1.11.13-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-misc@1.11.13-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-src@1.11.13-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-tests@1.11.13-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11@1.11.13-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-build@1.11.13-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-runtime@1.11.13-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-scldevel@1.11.13-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang@1.11.13-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-bin@1.11.13-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-misc@1.11.13-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-src@1.11.13-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product_id": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-golang-tests@1.11.13-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11@1.11.13-1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-build@1.11.13-1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-runtime@1.11.13-1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product_id": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.11-scldevel@1.11.13-1.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Server-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.src", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch" }, "product_reference": "go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64" }, "product_reference": "go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "relates_to_product_reference": "7Workstation-DevTools-2019.3" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" }, "product_reference": "go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2019.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T17:47:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2682" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T17:47:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2682" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-Alt-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Server-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Server-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-build-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.src", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-bin-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-docs-0:1.11.13-2.el7.noarch", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-misc-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-race-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-src-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-golang-tests-0:1.11.13-2.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-runtime-0:1.11.13-1.el7.x86_64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.aarch64", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.ppc64le", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.s390x", "7Workstation-DevTools-2019.3:go-toolset-1.11-scldevel-0:1.11.13-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_2690
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for atomic-openshift is now available for Red Hat OpenShift Container Platform 3.10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced (CVE-2019-11247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 3.10 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2690", "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2690.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.10 security update", "tracking": { "current_release_date": "2024-11-05T21:24:14+00:00", "generator": { "date": "2024-11-05T21:24:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2690", "initial_release_date": "2019-09-12T06:37:28+00:00", "revision_history": [ { "date": "2019-09-12T06:37:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T06:37:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:24:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.10", "product": { "name": "Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hyperkube@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hypershift@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.10.170-1.git.0.8e592d6.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hyperkube@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hypershift@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.10.170-1.git.0.8e592d6.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product_id": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.10.170-1.git.0.8e592d6.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.10.170-1.git.0.8e592d6.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.10.170-1.git.0.8e592d6.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] } ], "cve": "CVE-2019-11247", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732192" } ], "notes": [ { "category": "description", "text": "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11247" }, { "category": "external", "summary": "RHBZ#1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc" } ], "release_date": "2019-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T06:37:28+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.170, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2690" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.src", "7Server-RH7-RHOSE-3.10:atomic-openshift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-clients-redistributable-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-docker-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-excluder-0:3.10.170-1.git.0.8e592d6.el7.noarch", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hyperkube-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-hypershift-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-master-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-node-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-pod-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-sdn-ovs-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-template-service-broker-0:3.10.170-1.git.0.8e592d6.el7.x86_64", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.ppc64le", "7Server-RH7-RHOSE-3.10:atomic-openshift-tests-0:3.10.170-1.git.0.8e592d6.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced" } ] }
rhsa-2019_2966
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Quay packages that fix several bugs and add various enhancements are now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Quay 3.1.1 errata release, including:\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Fixed repository mirror credentials properly escaped to allow special characters\n* Fixed repository mirror UI cancel button enabled\n* Fixed repository mirror UI change next sync date", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2966", "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1750473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750473" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2966.json" } ], "title": "Red Hat Security Advisory: Red Hat Quay v3.1.1 security update", "tracking": { "current_release_date": "2024-11-05T21:27:56+00:00", "generator": { "date": "2024-11-05T21:27:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2966", "initial_release_date": "2019-10-03T18:57:22+00:00", "revision_history": [ { "date": "2019-10-03T18:57:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-03T18:57:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:27:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Quay v3", "product": { "name": "Quay v3", "product_id": "7Server-RH7-Quay-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:quay:3::el7" } } } ], "category": "product_family", "name": "Red Hat Quay" }, { "branches": [ { "category": "product_version", "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product": { "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product_id": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "product_identification_helper": { "purl": "pkg:oci/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821?arch=amd64\u0026repository_url=registry.redhat.io/quay3/clair-jwt\u0026tag=v2.0.9-7" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64 as a component of Quay v3", "product_id": "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" }, "product_reference": "quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64", "relates_to_product_reference": "7Server-RH7-Quay-3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-03T18:57:22+00:00", "details": "Please download the release images via:\n\nquay.io/redhat/quay:v3.1.1\nquay.io/redhat/clair-jwt:v3.1.1\nquay.io/redhat/quay-builder:v3.1.1", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-Quay-3:quay3/clair-jwt@sha256:57bfdaaa1d1cf6683474b7f032215b7af109e35e0a83aa6beb0a79b7ac565821_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" } ] }
rhsa-2019_2955
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.16.1).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2955", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2955.json" } ], "title": "Red Hat Security Advisory: rh-nodejs8-nodejs security update", "tracking": { "current_release_date": "2024-11-05T21:27:44+00:00", "generator": { "date": "2024-11-05T21:27:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2955", "initial_release_date": "2019-10-02T14:29:13+00:00", "revision_history": [ { "date": "2019-10-02T14:29:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-02T14:29:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:27:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.src", "product": { "name": "rh-nodejs8-0:3.0-5.el7.src", "product_id": "rh-nodejs8-0:3.0-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_id": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-docs@8.16.1-2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019_2925
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2925", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2925.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2024-11-05T21:27:08+00:00", "generator": { "date": "2024-11-05T21:27:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2925", "initial_release_date": "2019-09-30T15:15:54+00:00", "revision_history": [ { "date": "2019-09-30T15:15:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-30T15:15:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:27:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8000020190911085529:f8e95b4e", "product": { "name": "nodejs:10:8000020190911085529:f8e95b4e", "product_id": "nodejs:10:8000020190911085529:f8e95b4e", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8000020190911085529:f8e95b4e" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_id": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, "product_reference": "nodejs:10:8000020190911085529:f8e95b4e", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch" }, "product_reference": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019_4269
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc (CVE-2019-16884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)\n\n* backport json-file logging support to 1.4.2 (BZ#1770176)\n\n* Selinux won\u0027t allow SCTP inter pod communication (BZ#1774382)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4269", "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1757214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757214" }, { "category": "external", "summary": "1764318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764318" }, { "category": "external", "summary": "1770176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770176" }, { "category": "external", "summary": "1774382", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774382" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4269.json" } ], "title": "Red Hat Security Advisory: container-tools:rhel8 security and bug fix update", "tracking": { "current_release_date": "2024-11-05T21:41:10+00:00", "generator": { "date": "2024-11-05T21:41:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4269", "initial_release_date": "2019-12-17T12:56:53+00:00", "revision_history": [ { "date": "2019-12-17T12:56:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-17T12:56:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:41:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:rhel8:8010020191126140055:c294d161", "product": { "name": "container-tools:rhel8:8010020191126140055:c294d161", "product_id": "container-tools:rhel8:8010020191126140055:c294d161", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/container-tools@rhel8:8010020191126140055:c294d161" } } }, { "category": "product_version", "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product_id": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@4-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product_id": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.123.0-2.module%2Bel8.1.0%2B4900%2B9d7326b8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product": { "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_id": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=noarch" } } }, { "category": "product_version", "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product": { "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_id": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-manpages@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=noarch" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product_id": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-podman-api@1.2.0-0.1.gitd0a45fe.module%2Bel8.1.0%2B4081%2Bb29780af?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=src" } } }, { "category": "product_version", "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product_id": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@4-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product_id": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.123.0-2.module%2Bel8.1.0%2B4900%2B9d7326b8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=src" } } }, { "category": "product_version", "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product_id": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-podman-api@1.2.0-0.1.gitd0a45fe.module%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.4-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debuginfo@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debugsource@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debuginfo@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debugsource@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.4-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debuginfo@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debugsource@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debuginfo@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debugsource@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.4-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debuginfo@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debugsource@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debuginfo@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debugsource@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.4-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_id": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.9.0-5.module%2Bel8.1.0%2B4240%2B893c1ab8?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.1-3.module%2Bel8.1.0%2B4881%2B045289ee?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.4.1-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debuginfo@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debugsource@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debuginfo@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debugsource@2.3.4-2.git87f9237.module%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_id": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@1.4.2-6.module%2Bel8.1.0%2B4830%2Bf49150d7?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_id": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-61.rc8.module%2Bel8.1.0%2B4873%2B4a24e241?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_id": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@0.1.37-6.module%2Bel8.1.0%2B4876%2Be678a192?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_id": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.3.0-4.module%2Bel8.1.0%2B4306%2B1d917805?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product_id": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.4-1.module%2Bel8.1.0%2B4081%2Bb29780af?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, "product_reference": "container-tools:rhel8:8010020191126140055:c294d161", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64" }, "product_reference": "buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch" }, "product_reference": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch" }, "product_reference": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src" }, "product_reference": "container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch" }, "product_reference": "podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch" }, "product_reference": "podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64" }, "product_reference": "podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch" }, "product_reference": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src" }, "product_reference": "python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64" }, "product_reference": "skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64" }, "product_reference": "slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64 as a component of container-tools:rhel8:8010020191126140055:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" }, "product_reference": "toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "cve": "CVE-2019-16884", "cwe": { "id": "CWE-41", "name": "Improper Resolution of Path Equivalence" }, "discovery_date": "2019-09-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1757214" } ], "notes": [ { "category": "description", "text": "runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.", "title": "Vulnerability description" }, { "category": "summary", "text": "runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc", "title": "Vulnerability summary" }, { "category": "other", "text": "The AppArmor security module is not supported by Red Hat, on the other hand the flaw also affects SELinux based distributions like Red Hat Enterprise Linux.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16884" }, { "category": "external", "summary": "RHBZ#1757214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16884", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16884" } ], "release_date": "2019-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "runc: AppArmor/SELinux bypass with malicious image that specifies a volume at /proc" }, { "cve": "CVE-2019-18466", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2019-08-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1744588" } ], "notes": [ { "category": "description", "text": "It was discovered that podman resolves a symlink in the host context during a copy operation from the container to the host. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: resolving symlink in host filesystem leads to unexpected results of copy operation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of podman as shipped with Red Hat Enterprise Linux 8 as they did not include support for the copy function.\n\nThis issue did not affect the versions of podman as shipped in OpenShift Container Platform 3.11 and 4.1 as they did not include support for the copy function.\n\nThe version of podman shipped in OpenShift Container Platform 4.2 was superseded by the version delivered Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18466" }, { "category": "external", "summary": "RHBZ#1744588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744588" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18466", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18466" } ], "release_date": "2019-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4269" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-debugsource-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:buildah-tests-debuginfo-0:1.9.0-5.module+el8.1.0+4240+893c1ab8.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:cockpit-podman-0:4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:container-selinux-2:2.123.0-2.module+el8.1.0+4900+9d7326b8.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debuginfo-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containernetworking-plugins-debugsource-0:0.8.1-3.module+el8.1.0+4881+045289ee.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:containers-common-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debuginfo-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:fuse-overlayfs-debugsource-0:0.4.1-1.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+4081+b29780af.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-debugsource-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-docker-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-manpages-0:1.4.2-6.module+el8.1.0+4830+f49150d7.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-remote-debuginfo-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:podman-tests-0:1.4.2-6.module+el8.1.0+4830+f49150d7.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:python-podman-api-0:1.2.0-0.1.gitd0a45fe.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debuginfo-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:runc-debugsource-0:1.0.0-61.rc8.module+el8.1.0+4873+4a24e241.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debuginfo-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-debugsource-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:skopeo-tests-1:0.1.37-6.module+el8.1.0+4876+e678a192.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debuginfo-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:slirp4netns-debugsource-0:0.3.0-4.module+el8.1.0+4306+1d917805.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:rhel8:8010020191126140055:c294d161:toolbox-0:0.0.4-1.module+el8.1.0+4081+b29780af.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: resolving symlink in host filesystem leads to unexpected results of copy operation" } ] }
rhsa-2019_4021
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4021", "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=7.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=7.2" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4021.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 security update", "tracking": { "current_release_date": "2024-11-05T21:37:53+00:00", "generator": { "date": "2024-11-05T21:37:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4021", "initial_release_date": "2019-11-26T19:58:39+00:00", "revision_history": [ { "date": "2019-11-26T19:58:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:58:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:37:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2", "product": { "name": "Red Hat JBoss EAP 7.2", "product_id": "Red Hat JBoss EAP 7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat JBoss EAP 7.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss EAP 7.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:58:39+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss EAP 7.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "Red Hat JBoss EAP 7.2" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss EAP 7.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019_2594
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat\nOpenShift Container Platform 4.1.14. All container images have been rebuilt with updated versions of golang. See the following advisory for the\nRPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2019:2660\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis release also includes the following bugs: \n\n* Previously, users would see an error in the web console when navigating to the ClusterResourceQuota instances from the CRD list. The problem has been fixed, and you can now successfully list ClusterResourceQuota instances from the CRD page. (BZ#1743259)\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel\nease-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.1.14\n\nThe image digest is sha256:fd41c9bda9e0ff306954f1fd7af6428edff8c3989b75f9fe984968db66846231\n\nAll OpenShift Container Platform 4.1 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2594", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1717794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717794" }, { "category": "external", "summary": "1729510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729510" }, { "category": "external", "summary": "1735363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735363" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1737156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737156" }, { "category": "external", "summary": "1737164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737164" }, { "category": "external", "summary": "1737386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737386" }, { "category": "external", "summary": "1740044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740044" }, { "category": "external", "summary": "1741067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741067" }, { "category": "external", "summary": "1741499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741499" }, { "category": "external", "summary": "1741694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741694" }, { "category": "external", "summary": "1743119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743119" }, { "category": "external", "summary": "1743259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743259" }, { "category": "external", "summary": "1743418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743418" }, { "category": "external", "summary": "1743587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743587" }, { "category": "external", "summary": "1743748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743748" }, { "category": "external", "summary": "1743771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743771" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2594.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.14 security and bug fix update", "tracking": { "current_release_date": "2024-11-05T21:22:54+00:00", "generator": { "date": "2024-11-05T21:22:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2594", "initial_release_date": "2019-09-10T15:58:57+00:00", "revision_history": [ { "date": "2019-09-10T15:58:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-10T15:58:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:22:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product_id": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product": { "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product_id": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product": { "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product_id": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-logging-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product_id": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product_id": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product": { "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product_id": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product": { "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product_id": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product": { "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product_id": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-descheduler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product": { "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product_id": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-elasticsearch-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product": { "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product_id": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product": { "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product_id": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product": { "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product_id": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product_id": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product": { "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product_id": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product_id": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product": { "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product_id": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-curator5\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product": { "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product_id": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-elasticsearch5\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product": { "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product_id": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-eventrouter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product": { "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product_id": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-logging-fluentd\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product": { "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product_id": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product_id": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product": { "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product_id": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product": { "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product_id": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "product_identification_helper": { "purl": "pkg:oci/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/apb-base\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product": { "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product_id": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product": { "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product_id": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product": { "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product_id": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product": { "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product_id": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product": { "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product_id": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product": { "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product_id": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product": { "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product_id": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-dns-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product": { "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product_id": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-router\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product": { "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product_id": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product": { "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product_id": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product": { "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product_id": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product": { "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product_id": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-keepalived-ipfailover\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product": { "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product_id": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "product_identification_helper": { "purl": "pkg:oci/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mariadb-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product": { "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product_id": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "product_identification_helper": { "purl": "pkg:oci/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mediawiki-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product": { "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product_id": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "product_identification_helper": { "purl": "pkg:oci/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mediawiki\u0026tag=v4.1.14-201909040920" } } }, { "category": "product_version", "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product": { "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product_id": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "product_identification_helper": { "purl": "pkg:oci/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/mysql-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product": { "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product_id": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product": { "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_id": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_identification_helper": { "purl": "pkg:oci/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/postgresql-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product": { "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_id": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "product_identification_helper": { "purl": "pkg:oci/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/postgres-apb\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product": { "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product_id": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product": { "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product_id": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product": { "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product_id": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product_id": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product": { "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product_id": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product": { "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product_id": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product_id": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product_id": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product_id": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product_id": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product_id": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product_id": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product_id": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product_id": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product": { "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product_id": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-update-keys\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product": { "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product_id": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-egress-http-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product": { "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product_id": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.1.14" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product_id": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product": { "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product_id": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product": { "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product_id": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product_id": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product_id": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product": { "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product_id": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product": { "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product_id": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product": { "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product_id": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product_id": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product": { "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product_id": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-cni\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product_id": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin\u0026tag=v4.1.14-201908291507" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product": { "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product_id": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.1.14-201908291507" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64" }, "product_reference": "openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64" }, "product_reference": "openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64" }, "product_reference": "openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64" }, "product_reference": "openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64" }, "product_reference": "openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64" }, "product_reference": "openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64" }, "product_reference": "openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64" }, "product_reference": "openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64" }, "product_reference": "openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64" }, "product_reference": "openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64" }, "product_reference": "openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64" }, "product_reference": "openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64" }, "product_reference": "openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64" }, "product_reference": "openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64" }, "product_reference": "openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64" }, "product_reference": "openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64" }, "product_reference": "openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64" }, "product_reference": "openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64" }, "product_reference": "openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64" }, "product_reference": "openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64" }, "product_reference": "openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64" }, "product_reference": "openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64" }, "product_reference": "openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64" }, "product_reference": "openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64" }, "product_reference": "openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64" }, "product_reference": "openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64" }, "product_reference": "openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64" }, "product_reference": "openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64" }, "product_reference": "openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64" }, "product_reference": "openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64" }, "product_reference": "openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64" }, "product_reference": "openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64" }, "product_reference": "openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64" }, "product_reference": "openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64" }, "product_reference": "openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64" }, "product_reference": "openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64" }, "product_reference": "openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64" }, "product_reference": "openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64" }, "product_reference": "openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64" }, "product_reference": "openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64" }, "product_reference": "openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64" }, "product_reference": "openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64" }, "product_reference": "openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" }, "product_reference": "openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" }, "product_reference": "openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T15:58:57+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2594" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-10T15:58:57+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2594" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/apb-base@sha256:183441575a8a0ba144fdd346e5ab560a067725a9b66d890493c326e14135512e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mariadb-apb@sha256:a446829513325ac146b2aa1b555347b57a2377712df6cd8a431c1dbec0614331_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki-apb@sha256:0a1ab047c6a93e3531f20673b275854361f36e2ebd4894b5ad1705c3dde42a76_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mediawiki@sha256:8014f0d73799f7f26b56a3d908b55de3103103f57a507d48fe9830c7d605f85d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/mysql-apb@sha256:5772d2a584b96249c535df55b501ffe891162d7651b18244cdc16ab2f0d563dc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ansible-operator@sha256:9469e5ed49937aeb64f0a3dbb5332f087c8498494127a5c507c02c3d4286afb1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-aws-machine-controllers@sha256:e5f585aa452461ee95d55e84d81be54a82a458a54dbcad1f68a8f28edeb7638b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-azure-machine-controllers@sha256:9f3199e5226fdcd5abe34a6f2e3a6ad7e7ad3f59edbff2bfd9b4c84566897eae_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-baremetal-machine-controllers@sha256:d9ca5e81aa2fb401f9c5bfb63e85fc5d93ae1e657ab992e879a2b9d520f3fea3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli-artifacts@sha256:bacaec21f6101ef686bb07b5d6e80b0b3ad06ab9a4d4f6e611ca3103c0030d7e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cli@sha256:bb846647aa233adddf5ed39056fdf98a7d9dc3abef4c985df3de698a44ecc7fd_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cloud-credential-operator@sha256:27c7bac07c2a2a38ddb65a9997b22946fbe37ddd06ecf52eccd0ef9235ae47ba_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-authentication-operator@sha256:67dc9d9d90e5b37c73eda524a13e0bd98834b225adbfccc9d6c09a35a130c8f4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler-operator@sha256:989948cb9998b518f3c325a2af3b24cfb7033ad2ac8be96cb3fafce2b4077435_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-autoscaler@sha256:b995c30d43493a8d393282c760584605951048dbe395eeac6b6b1bec269ff3ad_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-bootstrap@sha256:9a676b7e363f022a511ab07ae81242b5c6d03523db11c37b0bf47e0f0324c9d8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-capacity@sha256:24db95a9d24960c14775136419eed7dfddb7b7d70577fab77a63b64fc66d53a7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-config-operator@sha256:3b210b7313b4853f777d19248ba746b3d29251a3409124f984ae212809930427_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-dns-operator@sha256:5f70ba7ebcee1ecb9f65c8b43280935866607fc3dee6329ed473169f2acebe05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-image-registry-operator@sha256:5c8fa5eb3828277f31ca0d4f7aedfee8e66dc0cfa3542772e6ac13c6b131644d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-ingress-operator@sha256:b33e32eaac7d15947e32cbeb9d45e9ae3e6fbe470611ab78f28cfc99d8759b68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-apiserver-operator@sha256:af88e84a2957ba9eeb1e5e3cdf9cf559ccb0de08d7a16c58a19c8eb805ba5a39_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-controller-manager-operator@sha256:ca1e29c0c4eb029ed4d5544d5fde000000aa007f1d8e0fcf0fc0d317b5e06784_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f30eebebe4b774acd19eadeae80c4a7c8ccb503389c354bc76fc0f778cefe2b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-logging-operator@sha256:7926e2be0854ff3edac0ced6950a0be04ad26d46a5da638611457c3fe0f1a19a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-machine-approver@sha256:3535b9ccd701ac3fa6b6a8339f6c10d6e74dd4d8f5f810690fa7e272ee82f837_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-monitoring-operator@sha256:05d69056c09c34d095ccedc757ecf2692690c72d2bee4e6b6afc58b01ec55d9c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-network-operator@sha256:2561079cceff11035c216fea71c0a10622696266aa5a9323ef13806c91537a68_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-node-tuning-operator@sha256:b6fa66947d674eb2fc12b38fb9355c43c57a484d85e56dd013960a760046b793_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-apiserver-operator@sha256:1291555580ce58d7855c7b93ace6826cd2b1a22499fc5df3aad7d36a30b880ee_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:3bdcfac3e9dcd30754f1e4158706bbcef77449fc3893521c86fd793cc1f7f32a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-samples-operator@sha256:79ba26ee177bc7cd2ab89ddaa6c66b5dcfc6970dc457cc737d64b18b5d378637_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-storage-operator@sha256:95ad59eb2e2cc58f7ae6b850f648259687f266f05ac91166a39da6bf441e3e86_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-update-keys@sha256:f919d82bd99ecd768271c8ef7ad6bf6d2b5cb902410b93bbafc829c58b59a48f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-cluster-version-operator@sha256:2d99cc15d95e08541d60ebc1966b534fda48d00ee69c7c226996ac407a813d6b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-configmap-reloader@sha256:84bb7a8504eb34ff5e4e9ca92aab960c078ededed07ab0fe79620c0b9f32a51f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console-operator@sha256:665d6d89d83c51de08526c08365317b3dbb9f20e1528ffb35697f6c8bd409ca3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-console@sha256:68c4a7514623c31f7fdf7058a0dcd968dc4e4a63bcf0236ff21333bfb27cc4aa_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-coredns@sha256:9a330c9540816c13ddbbc93e99107f3d2a194c79eae20d81e8b8d252e9282c14_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-deployer@sha256:ab62d8277ea2e69cf6697343c4b6bfef67f04c5f31cdf47fc510cb76969ca2ca_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler-operator@sha256:71ba5a71c71074c282634a6261825c57977abd4999cc03957b8c407808a72902_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-descheduler@sha256:f7527c56780840d4062768e88f098229effd9796639ad67f6cdf841941a7e4a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-builder@sha256:25b131fc577def1179ce8a2022211d366fa461b6afef2f566b3f177930a3d0db_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-docker-registry@sha256:f7bd292dde7bd96195b313b4c459980fe8541bd89c442a4065a0114f42f3fe46_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-dns-proxy@sha256:2c00e51829c679d3573f813b0eced5c16382966ecf609915b47a8472872bbb64_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-http-proxy@sha256:77ffd3c6dbb51743a13ce6a9cbd385602c24165848c205aca864b88af5b3c503_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-egress-router@sha256:c46ed6f837821decadaaf07266b9d67f89b98621618bc073abdc38db51bc692a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-elasticsearch-operator@sha256:6b153238aa96aa4128de68a8df8dde185ebb930d2cee6fe1c033ff7b713fb6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-etcd@sha256:3df453713db7ea9a1bd8556a0a986fcd8d8c0a4649c262b9d8652ccfe648bb1e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-grafana@sha256:4304ba0edd79f4b2b7b6f4766dd696e8fb21423ff0dc50a18388e2163d9df3de_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-haproxy-router@sha256:e0c7adba792e43e96c8d6f4e0845e2d001d0f652ece6f567b09ac481b07eafdc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hyperkube@sha256:150fe3e51c75f09bd366d06a96749e17cd01aa845319032c327387950b52a34e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-hypershift@sha256:48392b80092bca63f2969b14412017601ebfda1b54141db53c2bc5b2317c389a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer-artifacts@sha256:7f3e05fa013dead5501513b86c19719973d0f9ee5dbdd4d3f5264fe601dbf809_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-installer@sha256:7f0fb099018d7fba695adfff2c6cec1af789e3c3ccab61bb084a30ae1bdff79f_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-base@sha256:c29122b0ed52c031f5f99ddb3338b6515bc05ac1e90864dda1131dcf9af87924_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins-agent-maven@sha256:ce5dd50d7005ed2d5ef36de673a2cf2cec07ad997ed93956605fe8fc8836d15c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-jenkins@sha256:8da877d1df3fbb0fd4df607718847382d3ab38b862f868077c8938a1a7014f71_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-k8s-prometheus-adapter@sha256:95e7924437a3d110b334b1b03c01e2a65292f092110acde1a59db280ce8c7bda_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-keepalived-ipfailover@sha256:1c0b3bde2963560aa0c50bd8365abd39bc5cfae28409fbdc60abf786546eb2e8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-proxy@sha256:3afce3e28952226f1bb959b2859050e848ed5d4549ac5e2fc267f51b11fc6ec3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-rbac-proxy@sha256:dab4af2713fa59499ee8d2cb169d636ddb425590e6924bc2c03597c0b10bd246_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-kube-state-metrics@sha256:4ff6cd48b319093041c2fa9c32ce16c6ea4dffb1c66ef4923f9cfc108cdfe6cc_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-libvirt-machine-controllers@sha256:2446ea720c26b213b9419bd2ad867c0ca1ec6df6d972cd5ffd6037b8fe0fbc88_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-curator5@sha256:91942a469532fda2a4609f2d7ddf693cca5b2ccd8c770d0e36823f0cc67d884c_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-elasticsearch5@sha256:c4693439c2f0f114238cc4034bfc6cd17f93bb9562ac2c0f9feb30f9c657fcd7_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-eventrouter@sha256:7668a706700163a35def516d1e1be336fef418ea477ef014ba90f5317569384b_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-logging-fluentd@sha256:3ef99bc79d891b111828c6c29faa8f3cd37d8ab8897186eff2bc85824939f632_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-api-operator@sha256:6dfe7c13a6ae6c6e509f0d8cd0cb6e5284f9efd8cc2c949d87a471643e730957_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-machine-config-operator@sha256:ebffd73f3e4ff92792bad0cfa5bba5bec17e2124c7618ae7c4bd49ac777b7deb_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-admission-controller@sha256:101d1c2eeebf1c5e336238056ff9415de50855363eebce3b75cf6ac562adca05_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:9be2123934d7f80af6439a84b5a9887459c1655549c7790fd080e965e89049b4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-must-gather@sha256:1acef66db6179f4289fc4abbb297df32c01d3b13fd85530ac6a0d925b517c3df_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-oauth-proxy@sha256:383360705efc0605760c3b2b1d0fa288094eb6dad8158c540d950f661b4ba880_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-openstack-machine-controllers@sha256:1779881159f1548a75e4dfd8a285e6ecab2ceede42acd9d07f036ec28bf1e6f9_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:9254b8d3097a0d067f07bcf735b3530eccc888466f99a6282aebb7bbdd9cbcc8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-marketplace@sha256:3c5b9b86c9a9cd3c11290a44e29f016fe054b7068dd5b8469956909a63813db8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:5eecc9d91c1ae4f0af586aa7d97fce8a32f23dfcdd64dcc61b9c536fbf4e8663_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-ovn-kubernetes@sha256:d4234553bb7e59323ee19b5d87d189f78fb4cd747551af6a6413b88001e27e13_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-pod@sha256:40b2f3ff0b5ff873669613882579b2a714aed77e1fea4e28a26ebf2726177707_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prom-label-proxy@sha256:c77261cc981cc8a5193ca1199c0a119db5757de135f4f7f5e558744371d2bd8a_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-alertmanager@sha256:ef6c822baa9167856e613e7f1c14a1b44da42a394d91b9e0407d01d769a8fb40_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-config-reloader@sha256:6c0551dd87cc7eacc18ccbac093043b1178225f64843f13435f02ae7c2b4d91e_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-node-exporter@sha256:56c31eb82f202b0ab38bc600ef01ef68302a0a57b7274c9537d3518855e2da1d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus-operator@sha256:a5f9da1798e6b598157343e8751eda45ead551ddfb34ac5e742c6b1d8c8bf0d4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-prometheus@sha256:38e663d919d2c96af52656b42d18556cf457b84ef3160e27496f6db36ffa92a3_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-service-ca-operator@sha256:ba2867ef0021af24b6667d114983400a0f7f5824842f1e11d1cda5aa91286737_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-cni@sha256:7a129a17d719761425ce26a47eaa115789be893f4a1054e37f3c76f891157886_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-dp-admission-controller@sha256:e98327978a09c28baa5f10365d2df1e2c33bb689644d581aa6f7ff095e0c1c5d_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-sriov-network-device-plugin@sha256:4dc4017eee056448d0192834de329c6563c48f625f21ca9db59b22d54db70de8_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-telemeter@sha256:5abb2f8cd1758441ba75e07e0a2f1180dbda0f13e6b51993d7c945b3d91b3bef_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-tests@sha256:28866a167dd7df474b053e92de3ba9bc0d95d918180b1e676637df30c2a27ef4_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgres-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64", "7Server-RH7-RHOSE-4.1:openshift4/postgresql-apb@sha256:5dcbddc3a6828f444b155cdf8addb71e9c9e370a6cea1c6c5abecbaae6816624_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2020_2067
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat build of Thorntail.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat build of Thorntail 2.5.1 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.\n\nSecurity Fix(es):\n\n* apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)\n\n* cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12419)\n\n* hibernate-validator: safeHTML validator allows XSS (CVE-2019-10219)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jackson-databind: Multiple serialization gadgets (CVE-2019-17531, CVE-2019-16943, CVE-2019-16942, CVE-2019-17267, CVE-2019-14540, CVE-2019-16335, CVE-2019-14893, CVE-2019-14892, CVE-2020-9546, CVE-2020-9547, CVE-2020-9548, CVE-2020-10969, CVE-2020-10968, CVE-2020-11111, CVE-2020-11112, CVE-2020-11113, CVE-2020-11619, CVE-2020-11620, CVE-2019-20330, CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command \nexecution (CVE-2020-10672, CVE-2020-10673)\n\n* keycloak: adapter endpoints are exposed via arbitrary URLs (CVE-2019-14820)\n\n* keycloak: missing signatures validation on CRL used to verify client certificates (CVE-2019-3875)\n\n* keycloak: SAML broker does not check existence of signature on document allowing any user impersonation (CVE-2019-10201)\n\n* keycloak: CSRF check missing in My Resources functionality in the Account Console (CVE-2019-10199)\n\n* keycloak: cross-realm user access auth bypass (CVE-2019-14832)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader (CVE-2020-1729)\n\n* thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol (CVE-2019-0210)\n\n* thrift: Endless loop when feed with specific input data (CVE-2019-0205)\n\n* undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS (CVE-2019-14888)\n\n* wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use (CVE-2019-14887)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source (CVE-2019-12400)\n\nFor more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2067", "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=catRhoar.thorntail\u0026version=2.5.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=catRhoar.thorntail\u0026version=2.5.1" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_build_of_thorntail/2.5/html/release_notes_for_thorntail_2.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_build_of_thorntail/2.5/html/release_notes_for_thorntail_2.5/" }, { "category": "external", "summary": "1649870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649870" }, { "category": "external", "summary": "1690628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690628" }, { "category": "external", "summary": "1728609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728609" }, { "category": "external", "summary": "1729261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729261" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1738673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738673" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1749487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749487" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1755831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755831" }, { "category": "external", "summary": "1755849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755849" }, { "category": "external", "summary": "1758167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758167" }, { "category": "external", "summary": "1758171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758171" }, { "category": "external", "summary": "1758182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758182" }, { "category": "external", "summary": "1758187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758187" }, { "category": "external", "summary": "1758191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758191" }, { "category": "external", "summary": "1764607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764607" }, { "category": "external", "summary": "1764612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764612" }, { "category": "external", "summary": "1764658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764658" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1772008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772008" }, { "category": "external", "summary": "1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1802444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802444" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816175" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2067.json" } ], "title": "Red Hat Security Advisory: Red Hat build of Thorntail 2.5.1 security and bug fix update", "tracking": { "current_release_date": "2024-11-05T22:13:59+00:00", "generator": { "date": "2024-11-05T22:13:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:2067", "initial_release_date": "2020-05-18T10:24:57+00:00", "revision_history": [ { "date": "2020-05-18T10:24:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-05-18T10:24:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T22:13:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only RHOAR", "product": { "name": "Text-Only RHOAR", "product_id": "Text-Only RHOAR", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_application_runtimes:1.0" } } } ], "category": "product_family", "name": "Red Hat OpenShift Application Runtimes" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0205", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764612" } ], "notes": [ { "category": "description", "text": "In Apache Thrift all versions up to and including 0.12.0, a server or client may run into an endless loop when feed with specific input data. Because the issue had already been partially fixed in version 0.11.0, depending on the installed version it affects only certain language bindings.", "title": "Vulnerability description" }, { "category": "summary", "text": "thrift: Endless loop when feed with specific input data", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains a vulnerable version of libthrift. However, OpenDaylight does not expose libthrift in a vulnerable way, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe thrift package in OpenShift Container Platform is installed only in Curator images in the Logging stack. The affected code is included in this package, it\u0027s functionality is not used. This vulnerability is therefore rated Low for OpenShift Container Platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0205" }, { "category": "external", "summary": "RHBZ#1764612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0205", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0205" } ], "release_date": "2019-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "thrift: Endless loop when feed with specific input data" }, { "cve": "CVE-2019-0210", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764607" } ], "notes": [ { "category": "description", "text": "In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data.", "title": "Vulnerability description" }, { "category": "summary", "text": "thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains a vulnerable version of libthrift. However, OpenDaylight is not affected as this is a Golang specific problem, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe version of thrift delivered in OpenShift Container Platform is not affected by this vulnerability as it does not contain the affected code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0210" }, { "category": "external", "summary": "RHBZ#1764607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764607" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0210", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0210" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0210", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0210" } ], "release_date": "2019-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol" }, { "acknowledgments": [ { "names": [ "Marek Posolda" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-3875", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2019-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690628" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols (\u0027http\u0027 or \u0027ldap\u0027) and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn\u0027t validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: missing signatures validation on CRL used to verify client certificates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3875" }, { "category": "external", "summary": "RHBZ#1690628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690628" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3875", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3875" } ], "release_date": "2019-06-11T14:22:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: missing signatures validation on CRL used to verify client certificates" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-10199", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729261" } ], "notes": [ { "category": "description", "text": "It was found that Keycloak\u0027s account console did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: CSRF check missing in My Resources functionality in the Account Console", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10199" }, { "category": "external", "summary": "RHBZ#1729261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729261" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10199", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10199" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: CSRF check missing in My Resources functionality in the Account Console" }, { "cve": "CVE-2019-10201", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2019-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1728609" } ], "notes": [ { "category": "description", "text": "It was found that Keycloak\u0027s SAML broker did not verify missing message signatures. If an attacker modifies the SAML Response and removes the \u003cSignature\u003e sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: SAML broker does not check existence of signature on document allowing any user impersonation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10201" }, { "category": "external", "summary": "RHBZ#1728609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10201" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Administrator can prevent this issue for POST binding by requiring signed assertions.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: SAML broker does not check existence of signature on document allowing any user impersonation" }, { "acknowledgments": [ { "names": [ "Dominik Mizyn" ], "organization": "Samsung R\u0026D Institute Poland" } ], "cve": "CVE-2019-10219", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-05-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1738673" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "hibernate-validator: safeHTML validator allows XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it is being deprecated and is only receiving security fixes for Important and Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10219" }, { "category": "external", "summary": "RHBZ#1738673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10219", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10219" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10219" } ], "release_date": "2019-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hibernate-validator: safeHTML validator allows XSS" }, { "cve": "CVE-2019-12400", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1764658" } ], "notes": [ { "category": "description", "text": "In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12400" }, { "category": "external", "summary": "RHBZ#1764658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764658" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12400", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12400" } ], "release_date": "2019-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12419", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816175" } ], "notes": [ { "category": "description", "text": "A flaw was found in cxf in versions prior to 3.2.11 and 3.3.4. The access token services do not properly validate that an authenticated principal is equal to that of the supplied clientId parameter allowing a malicious client to use an authorization code that has been issued to a different client as their own. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Logging the openshift-logging/elasticsearch6-rhel8 container bundles the vulnerable version of apache-cxf, but the vulnerable class is not shipped, hence this component is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12419" }, { "category": "external", "summary": "RHBZ#1816175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816175" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12419", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12419" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-14540", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1755849" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14540" }, { "category": "external", "summary": "RHBZ#1755849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14540", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540" } ], "release_date": "2019-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "This vulnerability relies on com.zaxxer.hikari.HikariConfig being present in the application\u0027s ClassPath. Hikari is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use com.zaxxer.hikari are not impacted by this vulnerability.\n\nA mitigation to this class of problem in jackson-databind is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig" }, { "cve": "CVE-2019-14820", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-11-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1649870" } ], "notes": [ { "category": "description", "text": "It was found that keycloak exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: adapter endpoints are exposed via arbitrary URLs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14820" }, { "category": "external", "summary": "RHBZ#1649870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1649870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14820", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14820" } ], "release_date": "2019-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: adapter endpoints are exposed via arbitrary URLs" }, { "cve": "CVE-2019-14832", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2019-07-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1749487" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Keycloak REST API where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: cross-realm user access auth bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14832" }, { "category": "external", "summary": "RHBZ#1749487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749487" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14832", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14832" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14832", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14832" } ], "release_date": "2019-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak: cross-realm user access auth bypass" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14887", "cwe": { "id": "CWE-757", "name": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)" }, "discovery_date": "2019-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772008" } ], "notes": [ { "category": "description", "text": "A flaw was found when an OpenSSL security provider is used with Wildfly, the \u0027enabled-protocols\u0027 value in the Wildfly configuration isn\u0027t honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed over the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14887" }, { "category": "external", "summary": "RHBZ#1772008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14887", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14887" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Avoid using an OpenSSL security provider and instead use the default configuration or regular JSSE provider with \u0027TLS\u0027.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use" }, { "acknowledgments": [ { "names": [ "Henning Baldersheim", "H\u00e5vard Pettersen" ], "organization": "Verizon Media" } ], "cve": "CVE-2019-14888", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1772464" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Undertow HTTP server listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14888" }, { "category": "external", "summary": "RHBZ#1772464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14888" } ], "release_date": "2020-01-20T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "Enable HTTP2 (enable-http2=\"true\") in the undertow\u0027s HTTPS settings.", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS" }, { "cve": "CVE-2019-14892", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758171" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the commons-configuration package", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14892" }, { "category": "external", "summary": "RHBZ#1758171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758171" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14892", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14892" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14892", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14892" } ], "release_date": "2019-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the commons-configuration package" }, { "cve": "CVE-2019-14893", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758182" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the xalan package", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14893" }, { "category": "external", "summary": "RHBZ#1758182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758182" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14893", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14893" } ], "release_date": "2019-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the xalan package" }, { "cve": "CVE-2019-16335", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1755831" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16335" }, { "category": "external", "summary": "RHBZ#1755831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755831" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16335", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16335" } ], "release_date": "2019-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "This vulnerability relies on com.zaxxer.hikari.HikariDataSource being present in the application\u0027s ClassPath. Hikari is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use com.zaxxer.hikari are not impacted by this vulnerability.\n\nA mitigation to this class of problem in jackson-databind is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource" }, { "cve": "CVE-2019-16942", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758187" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16942" }, { "category": "external", "summary": "RHBZ#1758187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16942", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16942" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16942", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16942" } ], "release_date": "2019-09-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*" }, { "cve": "CVE-2019-16943", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758191" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16943" }, { "category": "external", "summary": "RHBZ#1758191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16943", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16943" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16943", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16943" } ], "release_date": "2019-09-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource" }, { "cve": "CVE-2019-17267", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758167" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in classes of the ehcache package", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17267" }, { "category": "external", "summary": "RHBZ#1758167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17267", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17267" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17267", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17267" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in classes of the ehcache package" }, { "cve": "CVE-2019-17531", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775293" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*", "title": "Vulnerability summary" }, { "category": "other", "text": "Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenShift Container Platform does ship the vulnerable component, but does not enable the unsafe conditions needed to exploit, lowering their vulnerability impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17531" }, { "category": "external", "summary": "RHBZ#1775293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775293" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17531", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17531" } ], "release_date": "2019-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "acknowledgments": [ { "names": [ "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-1729", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2019-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1802444" } ], "notes": [ { "category": "description", "text": "A flaw was found in SmallRye\u0027s API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1729" }, { "category": "external", "summary": "RHBZ#1802444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1729", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1729" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1729", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1729" } ], "release_date": "2020-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only RHOAR" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-05-18T10:24:57+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Text-Only RHOAR" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2067" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Text-Only RHOAR" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Text-Only RHOAR" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" } ] }
rhsa-2019_2939
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2939", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2939.json" } ], "title": "Red Hat Security Advisory: rh-nodejs10-nodejs security update", "tracking": { "current_release_date": "2024-11-05T21:27:01+00:00", "generator": { "date": "2024-11-05T21:27:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2939", "initial_release_date": "2019-10-01T10:03:49+00:00", "revision_history": [ { "date": "2019-10-01T10:03:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-01T10:03:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:27:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.src", "product": { "name": "rh-nodejs10-0:3.2-3.el7.src", "product_id": "rh-nodejs10-0:3.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_id": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-docs@10.16.3-3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12121", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661002" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Denial of Service with large HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12121" }, { "category": "external", "summary": "RHBZ#1661002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12121", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Denial of Service with large HTTP headers" }, { "cve": "CVE-2018-12122", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661005" } ], "notes": [ { "category": "description", "text": "It was found that Node.js HTTP server was vulnerable to a Slowloris type attack. An attacker could make long lived connections by sending bytes very slowly to the server, saturating its resource and possibly resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Slowloris HTTP Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12122" }, { "category": "external", "summary": "RHBZ#1661005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12122", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Slowloris HTTP Denial of Service" }, { "cve": "CVE-2018-12123", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661010" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Hostname spoofing in URL parser for javascript protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12123" }, { "category": "external", "summary": "RHBZ#1661010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12123", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12123" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Hostname spoofing in URL parser for javascript protocol" }, { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2019_3245
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for apb, containernetworking-plugins, and golang-github-prometheus-promu is now available for Red Hat OpenShift Container Platform 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThe following packages have been rebuilt with an updated version of golang: apb (2.0.3), containernetworking-plugins (0.8.1), and golang-github-prometheus-promu (0.5.0). \n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3245", "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3245.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.2 security update", "tracking": { "current_release_date": "2024-11-05T21:30:27+00:00", "generator": { "date": "2024-11-05T21:30:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:3245", "initial_release_date": "2019-10-29T17:43:03+00:00", "revision_history": [ { "date": "2019-10-29T17:43:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-29T17:43:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:30:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.2", "product": { "name": "Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.2::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.x86_64", "product": { "name": "apb-0:2.0.3-2.el7.x86_64", "product_id": "apb-0:2.0.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@2.0.3-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_id": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:2.0.3-2.el7.src", "product": { "name": "apb-0:2.0.3-2.el7.src", "product_id": "apb-0:2.0.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@2.0.3-2.el7?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_id": "containernetworking-plugins-0:0.8.1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.1-4.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_id": "apb-container-scripts-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb-container-scripts@2.0.3-2.el7?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:2.0.3-2.el7.noarch", "product": { "name": "apb-devel-0:2.0.3-2.el7.noarch", "product_id": "apb-devel-0:2.0.3-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb-devel@2.0.3-2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src" }, "product_reference": "apb-0:2.0.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:2.0.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64" }, "product_reference": "apb-0:2.0.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-container-scripts-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:2.0.3-2.el7.noarch as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch" }, "product_reference": "apb-devel-0:2.0.3-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.2", "product_id": "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T17:43:03+00:00", "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.1, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3245" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T17:43:03+00:00", "details": "For OpenShift Container Platform 4.2 see the following documentation, which\nwill be updated shortly for release 4.2.1, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3245" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.src", "7Server-RH7-RHOSE-4.2:apb-0:2.0.3-2.el7.x86_64", "7Server-RH7-RHOSE-4.2:apb-container-scripts-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:apb-devel-0:2.0.3-2.el7.noarch", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.src", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:containernetworking-plugins-debuginfo-0:0.8.1-4.el7.x86_64", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.src", "7Server-RH7-RHOSE-4.2:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64", "7Server-RH7-RHOSE-4.2:prometheus-promu-0:0.5.0-2.git642a960.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2020_3196
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Decision Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model \u0026 Notation (DMN) execution, and Business Optimizer for solving planning problems. It automates business decisions and makes that logic available to the entire business. \n\nThis release of Red Hat Decision Manager 7.8.0 serves as an update to Red Hat Decision Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)\n\n* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)\n\n* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)\n\n* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)\n\n* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)\n\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n\n* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)\n\n* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)\n\n* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)\n\n* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)\n\n* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)\n\n* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n\n* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)\n\n* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)\n\n* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)\n\n* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)\n\n* netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes (CVE-2020-11612)\n\n* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)\n\n* keycloak: security issue on reset credential flow (CVE-2020-1718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3196", "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhdm\u0026version=7.8.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhdm\u0026version=7.8.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3196.json" } ], "title": "Red Hat Security Advisory: Red Hat Decision Manager 7.8.0 Security Update", "tracking": { "current_release_date": "2024-11-05T22:30:25+00:00", "generator": { "date": "2024-11-05T22:30:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:3196", "initial_release_date": "2020-07-29T06:06:57+00:00", "revision_history": [ { "date": "2020-07-29T06:06:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T06:06:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T22:30:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Decision Manager 7", "product": { "name": "Red Hat Decision Manager 7", "product_id": "Red Hat Decision Manager 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_brms_platform:7.8" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12423", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797006" } ], "notes": [ { "category": "description", "text": "Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter \"rs.security.keystore.type\" to \"jwk\". For this case all keys are returned in this file \"as is\", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. \"oct\" keys, which contain secret keys, are not returned at all.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12423" }, { "category": "external", "summary": "RHBZ#1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12423", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-13990", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801149" } ], "notes": [ { "category": "description", "text": "The Terracotta Quartz Scheduler is susceptible to an XML external entity attack (XXE) through a job description. This issue stems from inadequate handling of XML external entity (XXE) declarations in the initDocumentParser function within xml/XMLSchedulingDataProcessor.java. By enticing a victim to access a maliciously crafted job description (containing XML content), a remote attacker could exploit this vulnerability to execute an XXE attack on the targeted system.", "title": "Vulnerability description" }, { "category": "summary", "text": "libquartz: XXE attacks via job description", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 uses a vulnerable version of libquartz as a dependency for Candlepin. However, the \u003cjob\u003e\u003cdescrition\u003e entry is not used, and the vulnerability can not be triggered. An update may fix the code in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13990" }, { "category": "external", "summary": "RHBZ#1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13990", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990" } ], "release_date": "2019-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libquartz: XXE attacks via job description" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17573", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797011" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: reflected XSS in the services listing page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17573" }, { "category": "external", "summary": "RHBZ#1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17573", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "Mitigate this flaw by disabling the service listing altogether; via setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: reflected XSS in the services listing page" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1718", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796756" } ], "notes": [ { "category": "description", "text": "A flaw was found in the reset credential flow in Keycloak. This flaw allows an attacker to gain unauthorized access to the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: security issue on reset credential flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1718" }, { "category": "external", "summary": "RHBZ#1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718" } ], "release_date": "2020-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "Disable reset credential flow.", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: security issue on reset credential flow" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11612", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816216" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform end users don\u0027t have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it.\n\n\nThird party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn\u0027t necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. \n\nRed Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release.\n\nMore information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11612" }, { "category": "external", "summary": "RHBZ#1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11612", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612" } ], "release_date": "2020-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" }, { "cve": "CVE-2020-14060", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848960" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14060" }, { "category": "external", "summary": "RHBZ#1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14060", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-14061", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848966" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in weblogic/oracle-aqjms", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14061" }, { "category": "external", "summary": "RHBZ#1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14061", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oracle.jms.AQjms*ConnectionFactory in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in weblogic/oracle-aqjms" }, { "cve": "CVE-2020-14062", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848962" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14062" }, { "category": "external", "summary": "RHBZ#1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14062", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool" } ] }
rhsa-2019_4018
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4018", "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17603", "url": "https://issues.redhat.com/browse/JBEAP-17603" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4018.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security update", "tracking": { "current_release_date": "2024-11-05T21:38:37+00:00", "generator": { "date": "2024-11-05T21:38:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4018", "initial_release_date": "2019-11-26T19:57:07+00:00", "revision_history": [ { "date": "2019-11-26T19:57:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:57:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:38:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.26-2.SP3_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.2.10-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.2.10-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.2.10-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.2.10-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.5-5.SP3_redhat_00003.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-byte-buddy@1.9.11-1.redhat_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.4.18-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.4.18-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.4.18-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.4.18-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.4.18-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.4.18-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.4.18-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.4.18-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.4.18-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client-microprofile@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.4.4-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-client-common@1.0.17-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-ejb-client@1.0.17-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-naming-client@1.0.17-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-transaction-client@1.0.17-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.0.17-2.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.6.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate@5.3.13-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-core@5.3.13-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-entitymanager@5.3.13-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-envers@5.3.13-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-java8@5.3.13-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketbox@5.0.3-6.Final_redhat_00005.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketbox-infinispan@5.0.3-6.Final_redhat_00005.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-bindings@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-wildfly8@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-api@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-common@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-config@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-idm-api@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-idm-impl@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-idm-simple-schema@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-impl@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.7.6-2.SP1_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly13.0-server@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly14.0-server@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl@1.0.8-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-java@1.0.8-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-remoting@5.0.16-2.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-yasson@1.0.5-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-genericjms@2.0.2-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-msc@1.4.11-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.2.5-4.GA_redhat_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.2.5-4.GA_redhat_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.2.5-4.GA_redhat_00002.1.el6eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.26-2.SP3_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.2.10-1.redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.5-5.SP3_redhat_00003.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-byte-buddy@1.9.11-1.redhat_00002.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.4.18-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.6.1-7.SP7_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.4.4-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-client@1.0.17-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.0.17-2.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.6.5-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate@5.3.13-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketbox@5.0.3-6.Final_redhat_00005.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-bindings@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-20.SP12_redhat_00009.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.7.6-2.SP1_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.3.1-6.Final_redhat_00006.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl@1.0.8-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-remoting@5.0.16-2.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-yasson@1.0.5-1.redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-genericjms@2.0.2-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-msc@1.4.11-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.2.5-4.GA_redhat_00002.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64@1.0.8-5.Final_redhat_00001.1.el6eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64@1.0.8-5.Final_redhat_00001.1.el6eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64-debuginfo@1.0.8-5.Final_redhat_00001.1.el6eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details about how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el6eap.src", "6Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el6eap.src", "6Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el6eap.x86_64", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019_3906
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThe following RPM packages have been rebuilt with updated version of Go, which includes the security fixes listed further below:\n\natomic-enterprise-service-catalog\natomic-openshift-cluster-autoscaler\natomic-openshift-descheduler\natomic-openshift-metrics-server\natomic-openshift-node-problem-detector\natomic-openshift-service-idler\natomic-openshift-web-console\ncockpit\ncsi-attacher\ncsi-driver-registrar\ncsi-livenessprobe\ncsi-provisioner\ngolang-github-openshift-oauth-proxy\ngolang-github-openshift-prometheus-alert-buffer\ngolang-github-prometheus-alertmanager\ngolang-github-prometheus-node_exporter\ngolang-github-prometheus-prometheus\nhawkular-openshift-agent\nheapster\nimage-inspector\nopenshift-enterprise-autoheal\nopenshift-enterprise-cluster-capacity\nopenshift-eventrouter\nopenshift-external-storage\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3906", "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3906.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 HTTP/2 security update", "tracking": { "current_release_date": "2024-11-05T21:37:28+00:00", "generator": { "date": "2024-11-05T21:37:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:3906", "initial_release_date": "2019-11-18T16:26:09+00:00", "revision_history": [ { "date": "2019-11-18T16:26:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-18T16:26:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:37:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.154-1.git.1.fa68ced.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.154-1.git.1.fa68ced.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.154-1.git.1.532da7a.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.154-1.git.1.1d31032.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.154-1.git.1.6a6b6ce.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.154-1.git.1.f80fb86.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.154-1.git.1.f54cb18.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-kubernetes@195-2.rhaos.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-debuginfo@195-2.rhaos.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-attacher@0.2.0-4.git27299be.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product_id": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-attacher-debuginfo@0.2.0-4.git27299be.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-driver-registrar@0.2.0-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product_id": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-driver-registrar-debuginfo@0.2.0-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-livenessprobe@0.0.1-2.gitff5b6a0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_id": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-livenessprobe-debuginfo@0.0.1-2.gitff5b6a0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product_id": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-provisioner@0.2.0-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product_id": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-provisioner-debuginfo@0.2.0-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.154-1.git.1.220e3dc.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product_id": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-alertmanager@3.11.154-1.git.1.4acd2e6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.11.154-1.git.1.bc9f224.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product_id": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus@3.11.154-1.git.1.148db48.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/hawkular-openshift-agent@1.2.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.ppc64le", "product": { "name": "heapster-0:1.3.0-4.el7.ppc64le", "product_id": "heapster-0:1.3.0-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/heapster@1.3.0-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.ppc64le", "product": { "name": "image-inspector-0:2.4.0-4.el7.ppc64le", "product_id": "image-inspector-0:2.4.0-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/image-inspector@2.4.0-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.154-1.git.1.13199be.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-debuginfo@0.0.2-9.gitd3c94f0.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.154-1.git.1.fa68ced.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.154-1.git.1.fa68ced.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.154-1.git.1.532da7a.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.154-1.git.1.1d31032.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.154-1.git.1.6a6b6ce.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.154-1.git.1.f80fb86.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.154-1.git.1.f54cb18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-kubernetes@195-2.rhaos.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-debuginfo@195-2.rhaos.el7?arch=x86_64" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-attacher@0.2.0-4.git27299be.el7?arch=x86_64" } } }, { "category": "product_version", "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product_id": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-attacher-debuginfo@0.2.0-4.git27299be.el7?arch=x86_64" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-driver-registrar@0.2.0-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product_id": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-driver-registrar-debuginfo@0.2.0-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-livenessprobe@0.0.1-2.gitff5b6a0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_id": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-livenessprobe-debuginfo@0.0.1-2.gitff5b6a0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product_id": "csi-provisioner-0:0.2.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-provisioner@0.2.0-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product_id": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-provisioner-debuginfo@0.2.0-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.154-1.git.1.220e3dc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product_id": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-alertmanager@3.11.154-1.git.1.4acd2e6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.11.154-1.git.1.bc9f224.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product_id": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus@3.11.154-1.git.1.148db48.el7?arch=x86_64" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hawkular-openshift-agent@1.2.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.x86_64", "product": { "name": "heapster-0:1.3.0-4.el7.x86_64", "product_id": "heapster-0:1.3.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/heapster@1.3.0-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.x86_64", "product": { "name": "image-inspector-0:2.4.0-4.el7.x86_64", "product_id": "image-inspector-0:2.4.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/image-inspector@2.4.0-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.154-1.git.1.13199be.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-debuginfo@0.0.2-9.gitd3c94f0.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.154-1.git.1.fa68ced.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.154-1.git.1.532da7a.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product_id": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.154-1.git.1.1d31032.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product_id": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.154-1.git.1.6a6b6ce.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.154-1.git.1.5e8e065.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product_id": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.154-1.git.1.f80fb86.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product_id": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.154-1.git.1.f54cb18.el7?arch=src" } } }, { "category": "product_version", "name": "cockpit-0:195-2.rhaos.el7.src", "product": { "name": "cockpit-0:195-2.rhaos.el7.src", "product_id": "cockpit-0:195-2.rhaos.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit@195-2.rhaos.el7?arch=src" } } }, { "category": "product_version", "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product_id": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-attacher@0.2.0-4.git27299be.el7?arch=src" } } }, { "category": "product_version", "name": "csi-driver-registrar-0:0.2.0-2.el7.src", "product": { "name": "csi-driver-registrar-0:0.2.0-2.el7.src", "product_id": "csi-driver-registrar-0:0.2.0-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-driver-registrar@0.2.0-2.el7?arch=src" } } }, { "category": "product_version", "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product_id": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-livenessprobe@0.0.1-2.gitff5b6a0.el7?arch=src" } } }, { "category": "product_version", "name": "csi-provisioner-0:0.2.0-3.el7.src", "product": { "name": "csi-provisioner-0:0.2.0-3.el7.src", "product_id": "csi-provisioner-0:0.2.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/csi-provisioner@0.2.0-3.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.154-1.git.1.220e3dc.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@3.11.154-1.git.1.4acd2e6.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.11.154-1.git.1.bc9f224.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product_id": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-prometheus@3.11.154-1.git.1.148db48.el7?arch=src" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hawkular-openshift-agent@1.2.2-3.el7?arch=src" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.src", "product": { "name": "heapster-0:1.3.0-4.el7.src", "product_id": "heapster-0:1.3.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/heapster@1.3.0-4.el7?arch=src" } } }, { "category": "product_version", "name": "image-inspector-0:2.4.0-4.el7.src", "product": { "name": "image-inspector-0:2.4.0-4.el7.src", "product_id": "image-inspector-0:2.4.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/image-inspector@2.4.0-4.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product_id": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.154-1.git.1.13199be.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.154-1.git.1.5798c2c.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product": { "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product_id": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage@0.0.2-9.gitd3c94f0.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-0:195-2.rhaos.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src" }, "product_reference": "cockpit-0:195-2.rhaos.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64" }, "product_reference": "csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le" }, "product_reference": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64" }, "product_reference": "csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-0:0.2.0-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64" }, "product_reference": "csi-driver-registrar-0:0.2.0-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le" }, "product_reference": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64" }, "product_reference": "csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64" }, "product_reference": "csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le" }, "product_reference": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64" }, "product_reference": "csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-0:0.2.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64" }, "product_reference": "csi-provisioner-0:0.2.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le" }, "product_reference": "csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64" }, "product_reference": "csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le" }, "product_reference": "heapster-0:1.3.0-4.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src" }, "product_reference": "heapster-0:1.3.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64" }, "product_reference": "heapster-0:1.3.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le" }, "product_reference": "image-inspector-0:2.4.0-4.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src" }, "product_reference": "image-inspector-0:2.4.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.4.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64" }, "product_reference": "image-inspector-0:2.4.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le" }, "product_reference": "prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64" }, "product_reference": "prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le" }, "product_reference": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-18T16:26:09+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3906" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-18T16:26:09+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3906" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.154-1.git.1.fa68ced.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.154-1.git.1.532da7a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.154-1.git.1.1d31032.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.154-1.git.1.6a6b6ce.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.154-1.git.1.5e8e065.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.154-1.git.1.f80fb86.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.154-1.git.1.f54cb18.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.src", "7Server-RH7-RHOSE-3.11:csi-attacher-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-attacher-debuginfo-0:0.2.0-4.git27299be.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.src", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-driver-registrar-debuginfo-0:0.2.0-2.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.src", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-livenessprobe-debuginfo-0:0.0.1-2.gitff5b6a0.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.src", "7Server-RH7-RHOSE-3.11:csi-provisioner-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:csi-provisioner-debuginfo-0:0.2.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.154-1.git.1.220e3dc.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.154-1.git.1.bc9f224.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.154-1.git.1.148db48.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.ppc64le", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.11:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.11:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.ppc64le", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.src", "7Server-RH7-RHOSE-3.11:image-inspector-0:2.4.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.154-1.git.1.13199be.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.154-1.git.1.5798c2c.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-0:0.0.2-9.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-cephfs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-debuginfo-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-efs-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-local-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-manila-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-controller-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-external-storage-snapshot-provisioner-0:0.0.2-9.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.154-1.git.1.148db48.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.154-1.git.1.4acd2e6.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.154-1.git.1.bc9f224.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_4042
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.3.5 packages are now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.3.5 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.3.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* keycloak: Service accounts reset password flow not using placeholder.org domain anymore (CVE-2019-14837)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4042", "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "category": "external", "summary": "1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "KEYCLOAK-11817", "url": "https://issues.redhat.com/browse/KEYCLOAK-11817" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4042.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.3.5 security update on RHEL 8", "tracking": { "current_release_date": "2024-11-05T21:38:30+00:00", "generator": { "date": "2024-11-05T21:38:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4042", "initial_release_date": "2019-12-02T17:04:50+00:00", "revision_history": [ { "date": "2019-12-02T17:04:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-02T17:04:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:38:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.3 for RHEL 8", "product": { "name": "Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7::el8" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@4.8.15-1.Final_redhat_00001.1.el8sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@4.8.15-1.Final_redhat_00001.1.el8sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product_id": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@4.8.15-1.Final_redhat_00001.1.el8sso?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src" }, "product_reference": "rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "relates_to_product_reference": "8Base-RHSSO-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.3 for RHEL 8", "product_id": "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.3" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Vadim Ashikhman" ] } ], "cve": "CVE-2019-14837", "cwe": { "id": "CWE-547", "name": "Use of Hard-coded, Security-relevant Constants" }, "discovery_date": "2019-07-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730227" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak. The use of an open hard-coded domain can allow an unauthorized login by setting up a mail server and resetting the user credentials, enabling information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14837" }, { "category": "external", "summary": "RHBZ#1730227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14837" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14837" } ], "release_date": "2019-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "workaround", "details": "It is not a very straight forward workaround but it is possible to mitigate this by manually editing the default Email ID (service_account_name@placeholder.org) to some valid email ID (abc@gmail.com) in the USER_ENTITY table in the RHSSO database used.", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak: keycloak uses hardcoded open dummy domain for new accounts enabling information disclosure" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-02T17:04:50+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.3:rh-sso7-keycloak-0:4.8.15-1.Final_redhat_00001.1.el8sso.src", "8Base-RHSSO-7.3:rh-sso7-keycloak-server-0:4.8.15-1.Final_redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2020_3197
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Process Automation Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.\n\nThis release of Red Hat Process Automation Manager 7.8.0 serves as an update to Red Hat Process Automation Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* commons-beanutils: apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)\n\n* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)\n\n* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)\n\n* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)\n\n* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)\n\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n\n* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)\n\n* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)\n\n* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)\n\n* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)\n\n* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)\n\n* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n\n* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)\n\n* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)\n\n* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)\n\n* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)\n\n* netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes (CVE-2020-11612)\n\n* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)\n\n* keycloak: security issue on reset credential flow (CVE-2020-1718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3197", "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhpam\u0026version=7.8.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhpam\u0026version=7.8.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3197.json" } ], "title": "Red Hat Security Advisory: Red Hat Process Automation Manager 7.8.0 Security Update", "tracking": { "current_release_date": "2024-11-05T22:30:16+00:00", "generator": { "date": "2024-11-05T22:30:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:3197", "initial_release_date": "2020-07-29T06:21:49+00:00", "revision_history": [ { "date": "2020-07-29T06:21:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T06:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T22:30:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Process Automation 7", "product": { "name": "Red Hat Process Automation 7", "product_id": "Red Hat Process Automation 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.8" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12423", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797006" } ], "notes": [ { "category": "description", "text": "Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter \"rs.security.keystore.type\" to \"jwk\". For this case all keys are returned in this file \"as is\", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. \"oct\" keys, which contain secret keys, are not returned at all.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12423" }, { "category": "external", "summary": "RHBZ#1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12423", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-13990", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801149" } ], "notes": [ { "category": "description", "text": "The Terracotta Quartz Scheduler is susceptible to an XML external entity attack (XXE) through a job description. This issue stems from inadequate handling of XML external entity (XXE) declarations in the initDocumentParser function within xml/XMLSchedulingDataProcessor.java. By enticing a victim to access a maliciously crafted job description (containing XML content), a remote attacker could exploit this vulnerability to execute an XXE attack on the targeted system.", "title": "Vulnerability description" }, { "category": "summary", "text": "libquartz: XXE attacks via job description", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 uses a vulnerable version of libquartz as a dependency for Candlepin. However, the \u003cjob\u003e\u003cdescrition\u003e entry is not used, and the vulnerability can not be triggered. An update may fix the code in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13990" }, { "category": "external", "summary": "RHBZ#1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13990", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990" } ], "release_date": "2019-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libquartz: XXE attacks via job description" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17573", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797011" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: reflected XSS in the services listing page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17573" }, { "category": "external", "summary": "RHBZ#1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17573", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "Mitigate this flaw by disabling the service listing altogether; via setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: reflected XSS in the services listing page" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1718", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796756" } ], "notes": [ { "category": "description", "text": "A flaw was found in the reset credential flow in Keycloak. This flaw allows an attacker to gain unauthorized access to the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: security issue on reset credential flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1718" }, { "category": "external", "summary": "RHBZ#1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718" } ], "release_date": "2020-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "Disable reset credential flow.", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: security issue on reset credential flow" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11612", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816216" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform end users don\u0027t have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it.\n\n\nThird party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn\u0027t necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. \n\nRed Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release.\n\nMore information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11612" }, { "category": "external", "summary": "RHBZ#1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11612", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612" } ], "release_date": "2020-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" }, { "cve": "CVE-2020-14060", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848960" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14060" }, { "category": "external", "summary": "RHBZ#1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14060", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-14061", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848966" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in weblogic/oracle-aqjms", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14061" }, { "category": "external", "summary": "RHBZ#1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14061", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oracle.jms.AQjms*ConnectionFactory in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in weblogic/oracle-aqjms" }, { "cve": "CVE-2020-14062", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848962" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14062" }, { "category": "external", "summary": "RHBZ#1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14062", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool" } ] }
rhsa-2019_4273
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:1.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4273", "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4273.json" } ], "title": "Red Hat Security Advisory: container-tools:1.0 security update", "tracking": { "current_release_date": "2024-11-05T21:41:23+00:00", "generator": { "date": "2024-11-05T21:41:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4273", "initial_release_date": "2019-12-17T12:56:46+00:00", "revision_history": [ { "date": "2019-12-17T12:56:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-17T12:56:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:41:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:1.0:8010020191126173920:c294d161", "product": { "name": "container-tools:1.0:8010020191126173920:c294d161", "product_id": "container-tools:1.0:8010020191126173920:c294d161", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/container-tools@1.0:8010020191126173920:c294d161" } } }, { "category": "product_version", "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product_id": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.94-1.git1e99f1d.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product": { "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product_id": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product_id": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.94-1.git1e99f1d.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=src" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debuginfo@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debugsource@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debuginfo@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debugsource@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debuginfo@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debugsource@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debuginfo@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debugsource@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debuginfo@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debugsource@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debuginfo@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debugsource@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.5-6.gite94b4f9.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.7.4-4.git9ebe139.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@0.3-5.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64" } } }, { "category": "product_version", "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debuginfo@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-systemd-hook-debugsource@0.1.15-2.git2d0b8a3.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debuginfo@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_id": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-umount-debugsource@2.3.4-2.git87f9237.module%2Bel8.1.0%2B3468%2B011f0ab0?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@1.0.0-4.git921f98f.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_id": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-56.rc5.dev.git2abd837.module%2Bel8.1.0%2B4908%2B72a45cef?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_id": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@0.1.32-6.git1715c90.module%2Bel8.1.0%2B4903%2B9bde5d6c?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_id": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@0.1-3.dev.gitc4e1bc5.module%2Bel8.1.0%2B4308%2B9d868e48?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, "product_reference": "container-tools:1.0:8010020191126173920:c294d161", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch" }, "product_reference": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64" }, "product_reference": "oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch" }, "product_reference": "podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64" }, "product_reference": "skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64 as a component of container-tools:1.0:8010020191126173920:c294d161 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" }, "product_reference": "slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4273" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-17T12:56:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4273" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debuginfo-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:buildah-debugsource-0:1.5-6.gite94b4f9.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:container-selinux-2:2.94-1.git1e99f1d.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debuginfo-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containernetworking-plugins-debugsource-0:0.7.4-4.git9ebe139.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:containers-common-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debuginfo-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:fuse-overlayfs-debugsource-0:0.3-5.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debuginfo-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-systemd-hook-debugsource-1:0.1.15-2.git2d0b8a3.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debuginfo-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:oci-umount-debugsource-2:2.3.4-2.git87f9237.module+el8.1.0+3468+011f0ab0.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debuginfo-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-debugsource-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:podman-docker-0:1.0.0-4.git921f98f.module+el8.1.0+4908+72a45cef.noarch", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debuginfo-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:runc-debugsource-0:1.0.0-56.rc5.dev.git2abd837.module+el8.1.0+4908+72a45cef.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debuginfo-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:skopeo-debugsource-1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.src", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debuginfo-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.aarch64", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.ppc64le", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.s390x", "AppStream-8.1.0.Z.MAIN.EUS:container-tools:1.0:8010020191126173920:c294d161:slirp4netns-debugsource-0:0.1-3.dev.gitc4e1bc5.module+el8.1.0+4308+9d868e48.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_3892
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.4 to 7.5) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.5.0 serves as a replacement for Red Hat Fuse 7.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095)\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485)\n\n* infinispan: deserialization of data in XML and JSON transcoders (CVE-2018-1131)\n\n* hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-8009)\n\n* jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis (CVE-2018-11307)\n\n* jackson-databind: improper polymorphic deserialization of types from Jodd-db library (CVE-2018-12022)\n\n* jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver (CVE-2018-12023)\n\n* jackson-databind: arbitrary code execution in slf4j-ext class (CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: improper polymorphic deserialization in axis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class (CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in jboss-common-core class (CVE-2018-19362)\n\n* retrofit: Directory traversal in RequestBuilder allows manipulation of resources (CVE-2018-1000850)\n\n* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)\n\n* mesos: docker image code execution (CVE-2019-0204)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* grpc: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* grpc: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* grpc: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)\n\n* syndesis: default CORS configuration is allow all (CVE-2019-14860)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* activemq: ActiveMQ Client Missing TLS Hostname Verification (CVE-2018-11775)\n\n* tika: Incomplete fix allows for XML entity expansion resulting in denial of service (CVE-2018-11796)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class (CVE-2018-14721)\n\n* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3892", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.5.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.5.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/" }, { "category": "external", "summary": "1506612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506612" }, { "category": "external", "summary": "1528565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528565" }, { "category": "external", "summary": "1576492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576492" }, { "category": "external", "summary": "1593018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593018" }, { "category": "external", "summary": "1607580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580" }, { "category": "external", "summary": "1629083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629083" }, { "category": "external", "summary": "1639090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639090" }, { "category": "external", "summary": "1663904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663904" }, { "category": "external", "summary": "1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "1671096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671096" }, { "category": "external", "summary": "1671097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671097" }, { "category": "external", "summary": "1677341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677341" }, { "category": "external", "summary": "1692755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692755" }, { "category": "external", "summary": "1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1761912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761912" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3892.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.5.0 security update", "tracking": { "current_release_date": "2024-11-05T21:36:45+00:00", "generator": { "date": "2024-11-05T21:36:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:3892", "initial_release_date": "2019-11-14T21:17:38+00:00", "revision_history": [ { "date": "2019-11-14T21:17:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:18:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:36:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.5.0", "product": { "name": "Red Hat Fuse 7.5.0", "product_id": "Red Hat Fuse 7.5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Liao Xinxi" ], "organization": "NSFOCUS" } ], "cve": "CVE-2017-15095", "cwe": { "id": "CWE-184", "name": "Incomplete List of Disallowed Inputs" }, "discovery_date": "2017-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506612" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jackson-databind (in Satellite 6.0 and 6.1) and candlepin (which embeds a copy of jackson-databind in Satellite 6.2) as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time:\n\nCandlepin currently uses the default type resolution configuration for the ObjectMappers it creates/uses. Nowhere in candlepin do we enable global polymorphic deserialization via enableDefaultTyping(...), therefore based on the documentation sited BZ 1462702 , candlepin should not be affected.\n\nHowever as the vulnerable software ships with the product we have marked them as vulnerable to ensure the issue is tracked.\n\nJBoss EAP 7.x only uses the vulnerable Jackson Databind library for marshalling and unmarshalling of JSON objects passed to JAX-RS webservices. Some advise about how to remain safe when using JAX-RS webservices on JBoss EAP 7.x is available here: \n\nhttps://access.redhat.com/solutions/3279231", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15095" }, { "category": "external", "summary": "RHBZ#1506612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15095", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3442891", "url": "https://access.redhat.com/solutions/3442891" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "Mitigation to this problem is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)" }, { "acknowledgments": [ { "names": [ "0c0c0f from 360\u89c2\u661f\u5b9e\u9a8c\u5ba4" ] } ], "cve": "CVE-2017-17485", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1528565" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending maliciously crafted input to the readValue method of ObjectMapper. This issue extends upon the previous flaws CVE-2017-7525 and CVE-2017-15095 by blacklisting more classes that could be used maliciously.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17485" }, { "category": "external", "summary": "RHBZ#1528565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17485", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17485" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3442891", "url": "https://access.redhat.com/solutions/3442891" } ], "release_date": "2017-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)" }, { "cve": "CVE-2018-1131", "cwe": { "id": "CWE-349", "name": "Acceptance of Extraneous Untrusted Data With Trusted Data" }, "discovery_date": "2018-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1576492" } ], "notes": [ { "category": "description", "text": "Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations. A user with authenticated access to the server could send a malicious object to a cache configured to accept certain types of objects, achieving code execution and possible further attacks. Versions 9.0.3.Final, 9.1.7.Final, 8.2.10.Final, 9.2.2.Final, 9.3.0.Alpha1 are believed to be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: deserialization of data in XML and JSON transcoders", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1131" }, { "category": "external", "summary": "RHBZ#1576492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1131", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1131" } ], "release_date": "2018-05-14T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: deserialization of data in XML and JSON transcoders" }, { "cve": "CVE-2018-8009", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1593018" } ], "notes": [ { "category": "description", "text": "Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.", "title": "Vulnerability description" }, { "category": "summary", "text": "hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of rhs-hadoop as shipped with Red Hat Gluster Storage 3. For JBoss Fuse 6.3 and 7 standalone, while they ship vulnerable artifact via camel-hbase, camel-hdfs2 (fuse 6.3) and camel-hdfs2 (fuse 7), there\u0027s no invocation on the flawed code that could lead to an unzip operation. So fuse 6.3, 7 standalone are not affected. However FIS 2.0 and Fuse 7 on OpenShift ship vulnerable artifact via maven BOM, so setting fuse as affected for this reason.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8009" }, { "category": "external", "summary": "RHBZ#1593018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8009", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8009" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8009", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8009" } ], "release_date": "2018-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file" }, { "cve": "CVE-2018-8034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1607580" } ], "notes": [ { "category": "description", "text": "The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Host name verification missing in WebSocket client", "title": "Vulnerability summary" }, { "category": "other", "text": "Tomcat 6, and Red Hat products shipping it, are not affected by this CVE. Tomcat 7, 8, and 9, as well as Red Hat Products shipping them, are affected. Affected products, including Red Hat JBoss Web Server 3 and 5, Enterprise Application Server 6, and Fuse 7, may provide fixes for this issue in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8034" }, { "category": "external", "summary": "RHBZ#1607580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8034" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034" } ], "release_date": "2018-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Host name verification missing in WebSocket client" }, { "cve": "CVE-2018-11307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677341" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using MyBatis classes when using DefaultTyping. An attacker could use this flaw to achieve content exfiltration and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load MyBatis classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include MyBatis classes.\n\nRed Hat Fuse 6 and 7 are not directly affected by this issue, as although they do ship the vulnerable jackson-databind component, they do not enable polymorphic deserialization or default typing which are required for exploitability. Their impacts have correspondingly been reduced to Moderate. Future updates may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11307" }, { "category": "external", "summary": "RHBZ#1677341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11307", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11307" } ], "release_date": "2018-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis" }, { "cve": "CVE-2018-11775", "discovery_date": "2018-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1629083" } ], "notes": [ { "category": "description", "text": "TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: ActiveMQ Client Missing TLS Hostname Verification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11775" }, { "category": "external", "summary": "RHBZ#1629083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629083" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11775", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11775" } ], "release_date": "2018-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: ActiveMQ Client Missing TLS Hostname Verification" }, { "cve": "CVE-2018-11796", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2018-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1639090" } ], "notes": [ { "category": "description", "text": "In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.", "title": "Vulnerability description" }, { "category": "summary", "text": "tika: Incomplete fix allows for XML entity expansion resulting in denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of tika which is embedded in the nutch package as shipped with Red Hat Satellite 5. The tika server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11796" }, { "category": "external", "summary": "RHBZ#1639090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11796", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11796" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11796", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11796" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E", "url": "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E" } ], "release_date": "2018-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tika: Incomplete fix allows for XML entity expansion resulting in denial of service" }, { "cve": "CVE-2018-12022", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671097" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Jodd DB connection classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization of types from Jodd-db library", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load Jodd classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not load Jodd classes.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12022" }, { "category": "external", "summary": "RHBZ#1671097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12022", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12022" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization of types from Jodd-db library" }, { "cve": "CVE-2018-12023", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671096" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Oracle JDBC classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load Oracle\u0027s JDBC classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not load Oracle\u0027s JDBC classes.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12023" }, { "category": "external", "summary": "RHBZ#1671096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671096" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12023", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12023" } ], "release_date": "2018-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver" }, { "cve": "CVE-2018-14718", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666415" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in slf4j-ext class", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14718" }, { "category": "external", "summary": "RHBZ#1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in slf4j-ext class" }, { "cve": "CVE-2018-14719", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666418" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14719" }, { "category": "external", "summary": "RHBZ#1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes" }, { "cve": "CVE-2018-14720", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666423" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: exfiltration/XXE in some JDK classes", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14720" }, { "category": "external", "summary": "RHBZ#1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: exfiltration/XXE in some JDK classes" }, { "cve": "CVE-2018-14721", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666428" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14721" }, { "category": "external", "summary": "RHBZ#1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class" }, { "cve": "CVE-2018-19360", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666482" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19360" }, { "category": "external", "summary": "RHBZ#1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19360" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class" }, { "cve": "CVE-2018-19361", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666484" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in openjpa class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19361" }, { "category": "external", "summary": "RHBZ#1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19361" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in openjpa class" }, { "cve": "CVE-2018-19362", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666489" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19362" }, { "category": "external", "summary": "RHBZ#1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class" }, { "cve": "CVE-2018-1000850", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2018-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663904" } ], "notes": [ { "category": "description", "text": "A flaw was found in Retrofit, where it allowed directory traversal via its RequestBuilder class. An attacker could use this flaw to access information or commands outside of its set permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "retrofit: Directory traversal in RequestBuilder allows manipulation of resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000850" }, { "category": "external", "summary": "RHBZ#1663904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000850", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850" } ], "release_date": "2018-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "retrofit: Directory traversal in RequestBuilder allows manipulation of resources" }, { "cve": "CVE-2019-0201", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715197" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.", "title": "Vulnerability description" }, { "category": "summary", "text": "zookeeper: Information disclosure in Apache ZooKeeper", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0201" }, { "category": "external", "summary": "RHBZ#1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201" } ], "release_date": "2019-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zookeeper: Information disclosure in Apache ZooKeeper" }, { "cve": "CVE-2019-0204", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1692755" } ], "notes": [ { "category": "description", "text": "A flaw was found in Docker image running under root user, where it is possible to overwrite the init helper binary of the container runtime or the command executor in Apache Mesos. A malicious user could use this flaw to gain root-level code execution on the host.", "title": "Vulnerability description" }, { "category": "summary", "text": "mesos: docker image code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0204" }, { "category": "external", "summary": "RHBZ#1692755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0204" } ], "release_date": "2019-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mesos: docker image code execution" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "acknowledgments": [ { "names": [ "Jeremy Choi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-14860", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2019-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1761912" } ], "notes": [ { "category": "description", "text": "It was found that the Syndesis configuration for Cross-Origin Resource Sharing was set to allow all origins. An attacker could use this lack of protection to conduct phishing attacks and further access unauthorized information.", "title": "Vulnerability description" }, { "category": "summary", "text": "syndesis: default CORS configuration is allow all", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14860" }, { "category": "external", "summary": "RHBZ#1761912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14860", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14860" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14860", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14860" } ], "release_date": "2019-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "syndesis: default CORS configuration is allow all" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" } ] }
rhsa-2019_4019
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4019", "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17604", "url": "https://issues.redhat.com/browse/JBEAP-17604" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4019.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update", "tracking": { "current_release_date": "2024-11-05T21:38:43+00:00", "generator": { "date": "2024-11-05T21:38:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4019", "initial_release_date": "2019-11-26T20:01:24+00:00", "revision_history": [ { "date": "2019-11-26T20:01:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T20:01:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:38:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketbox@5.0.3-6.Final_redhat_00005.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketbox-infinispan@5.0.3-6.Final_redhat_00005.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.26-2.SP3_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.2.10-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.2.10-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.2.10-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.2.10-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.5-5.SP3_redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-byte-buddy@1.9.11-1.redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.4.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.4.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.4.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.4.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.4.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.4.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.4.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.4.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.4.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client-microprofile@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.4.4-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-client-common@1.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-ejb-client@1.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-naming-client@1.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-transaction-client@1.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.0.17-2.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.6.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate@5.3.13-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-core@5.3.13-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-entitymanager@5.3.13-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-envers@5.3.13-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-java8@5.3.13-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-bindings@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-wildfly8@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-api@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-common@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-config@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-idm-api@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-idm-impl@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-idm-simple-schema@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-impl@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.7.6-2.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly13.0-server@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly14.0-server@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl@1.0.8-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-java@1.0.8-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-remoting@5.0.16-2.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-yasson@1.0.5-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-genericjms@2.0.2-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-msc@1.4.11-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.2.5-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.2.5-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.2.5-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.2.5-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.2.5-4.GA_redhat_00002.1.el7eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketbox@5.0.3-6.Final_redhat_00005.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.26-2.SP3_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.2.10-1.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.5-5.SP3_redhat_00003.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-byte-buddy@1.9.11-1.redhat_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.4.18-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.6.1-7.SP7_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.4.4-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-client@1.0.17-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.0.17-2.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.6.5-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate@5.3.13-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-bindings@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-20.SP12_redhat_00009.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.7.6-2.SP1_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.3.1-6.Final_redhat_00006.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl@1.0.8-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-remoting@5.0.16-2.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-yasson@1.0.5-1.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-genericjms@2.0.2-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-msc@1.4.11-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.2.5-4.GA_redhat_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64@1.0.8-5.Final_redhat_00001.1.el7eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64@1.0.8-5.Final_redhat_00001.1.el7eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64-debuginfo@1.0.8-5.Final_redhat_00001.1.el7eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T20:01:24+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el7eap.src", "7Server-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el7eap.src", "7Server-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk11-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-java-jdk8-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019_2769
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An security update is now available for Red Hat OpenShift Container Platform 3.9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains RPM packages for Red Hat OpenShift Container\nPlatform 3.9, which have been rebuilt with an updated version of golang.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced (CVE-2019-11247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2769", "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2769.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.9 security update", "tracking": { "current_release_date": "2024-11-05T21:24:44+00:00", "generator": { "date": "2024-11-05T21:24:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2769", "initial_release_date": "2019-10-24T21:31:32+00:00", "revision_history": [ { "date": "2019-10-24T21:31:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-24T21:31:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:24:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.9", "product": { "name": "Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.9::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product": { "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product_id": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.9.16-3.git858756d.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.9.16-3.git858756d.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@2.1-3.git885c9f40.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-debuginfo@0.0.1-9.git78d6339.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-capacity@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-federation-services@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-catalog@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.9.101-1.git.0.150f595.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.9.101-1.git.1.601c6d2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.9.101-1.git.1.13625cf.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.9.101-1.git.1.8295224.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product": { "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product_id": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker@1.1.20-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.x86_64", "product": { "name": "heapster-0:1.3.0-4.el7.x86_64", "product_id": "heapster-0:1.3.0-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/heapster@1.3.0-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/hawkular-openshift-agent@1.2.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product_id": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.1-3.git5bd9251.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.1-3.git5bd9251.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_id": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.0.0-6.rhaos3.9.git8e6013a.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.0.0-6.rhaos3.9.git8e6013a.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product_id": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.5.2-6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.5.2-6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0-5.git85ceabc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_id": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0-5.git85ceabc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "image-inspector-0:2.1.3-2.el7.x86_64", "product": { "name": "image-inspector-0:2.1.3-2.el7.x86_64", "product_id": "image-inspector-0:2.1.3-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/image-inspector@2.1.3-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product_id": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-kubernetes@0.1.0-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product_id": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-image-registry@3.8.0-2.git.216.b6b90bb.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.9.13-2.git.267.bb59a3f.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.9.13-2.git.167.5d6b0d4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product_id": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-alertmanager@0.14.0-2.git30af4d0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product": { "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product_id": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus@2.2.1-2.gitbc6058c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-kubernetes@195-2.rhaos.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_id": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-debuginfo@195-2.rhaos.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.9.16-3.git858756d.el7.src", "product": { "name": "cri-o-0:1.9.16-3.git858756d.el7.src", "product_id": "cri-o-0:1.9.16-3.git858756d.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.9.16-3.git858756d.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@2.1-3.git885c9f40.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product": { "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product_id": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage@0.0.1-9.git78d6339.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product_id": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.9.101-1.git.0.150f595.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product_id": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.9.101-1.git.1.601c6d2.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.9.101-1.git.1.8295224.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_id": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-prometheus-alert-buffer@0-3.gitceca8c1.el7?arch=src" } } }, { "category": "product_version", "name": "ansible-service-broker-0:1.1.20-2.el7.src", "product": { "name": "ansible-service-broker-0:1.1.20-2.el7.src", "product_id": "ansible-service-broker-0:1.1.20-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker@1.1.20-2.el7?arch=src" } } }, { "category": "product_version", "name": "heapster-0:1.3.0-4.el7.src", "product": { "name": "heapster-0:1.3.0-4.el7.src", "product_id": "heapster-0:1.3.0-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/heapster@1.3.0-4.el7?arch=src" } } }, { "category": "product_version", "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_id": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hawkular-openshift-agent@1.2.2-3.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product_id": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.1-3.git5bd9251.el7?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product_id": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.0.0-6.rhaos3.9.git8e6013a.el7?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.5.2-6.el7.src", "product": { "name": "containernetworking-plugins-0:0.5.2-6.el7.src", "product_id": "containernetworking-plugins-0:0.5.2-6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.5.2-6.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_id": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0-5.git85ceabc.el7?arch=src" } } }, { "category": "product_version", "name": "image-inspector-0:2.1.3-2.el7.src", "product": { "name": "image-inspector-0:2.1.3-2.el7.src", "product_id": "image-inspector-0:2.1.3-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/image-inspector@2.1.3-2.el7?arch=src" } } }, { "category": "product_version", "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product_id": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-kubernetes@0.1.0-3.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product_id": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-image-registry@3.8.0-2.git.216.b6b90bb.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product_id": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.9.13-2.git.267.bb59a3f.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.9.13-2.git.167.5d6b0d4.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@0.14.0-2.git30af4d0.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product_id": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-prometheus@2.2.1-2.gitbc6058c.el7?arch=src" } } }, { "category": "product_version", "name": "cockpit-0:195-2.rhaos.el7.src", "product": { "name": "cockpit-0:195-2.rhaos.el7.src", "product_id": "cockpit-0:195-2.rhaos.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit@195-2.rhaos.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.9.101-1.git.0.150f595.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.9.101-1.git.0.150f595.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product": { "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product_id": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker-container-scripts@1.1.20-2.el7?arch=noarch" } } }, { "category": "product_version", "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product": { "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product_id": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-service-broker-selinux@1.1.20-2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-0:1.1.20-2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src" }, "product_reference": "ansible-service-broker-0:1.1.20-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-0:1.1.20-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64" }, "product_reference": "ansible-service-broker-0:1.1.20-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch" }, "product_reference": "ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch" }, "product_reference": "ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src" }, "product_reference": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-0:195-2.rhaos.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src" }, "product_reference": "cockpit-0:195-2.rhaos.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64" }, "product_reference": "cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.5.2-6.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src" }, "product_reference": "containernetworking-plugins-0:0.5.2-6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.5.2-6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.5.2-6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.9.16-3.git858756d.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src" }, "product_reference": "cri-o-0:1.9.16-3.git858756d.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.9.16-3.git858756d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64" }, "product_reference": "cri-o-0:1.9.16-3.git858756d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src" }, "product_reference": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64" }, "product_reference": "cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64" }, "product_reference": "golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64" }, "product_reference": "hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src" }, "product_reference": "heapster-0:1.3.0-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "heapster-0:1.3.0-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64" }, "product_reference": "heapster-0:1.3.0-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.1.3-2.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src" }, "product_reference": "image-inspector-0:2.1.3-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "image-inspector-0:2.1.3-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64" }, "product_reference": "image-inspector-0:2.1.3-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src" }, "product_reference": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64" }, "product_reference": "openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src" }, "product_reference": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64" }, "product_reference": "openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src" }, "product_reference": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64" }, "product_reference": "openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64" }, "product_reference": "prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" }, "product_reference": "prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] } ], "cve": "CVE-2019-11247", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1732192" } ], "notes": [ { "category": "description", "text": "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11247" }, { "category": "external", "summary": "RHBZ#1732192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11247" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-discuss/Vf31dXp0EJc" } ], "release_date": "2019-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-24T21:31:32+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.100, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2769" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.src", "7Server-RH7-RHOSE-3.9:ansible-service-broker-0:1.1.20-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:ansible-service-broker-container-scripts-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:ansible-service-broker-selinux-0:1.1.20-2.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-clients-redistributable-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-cluster-capacity-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-descheduler-0:3.9.13-2.git.267.bb59a3f.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-docker-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-dockerregistry-0:3.9.101-1.git.1.13625cf.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-excluder-0:3.9.101-1.git.0.150f595.el7.noarch", "7Server-RH7-RHOSE-3.9:atomic-openshift-federation-services-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-master-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-node-problem-detector-0:3.9.13-2.git.167.5d6b0d4.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-pod-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-sdn-ovs-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-service-catalog-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-template-service-broker-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-tests-0:3.9.101-1.git.0.150f595.el7.x86_64", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.src", "7Server-RH7-RHOSE-3.9:atomic-openshift-web-console-0:3.9.101-1.git.1.601c6d2.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-0:195-2.rhaos.el7.src", "7Server-RH7-RHOSE-3.9:cockpit-debuginfo-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:cockpit-kubernetes-0:195-2.rhaos.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.src", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:containernetworking-plugins-debuginfo-0:0.5.2-6.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.src", "7Server-RH7-RHOSE-3.9:cri-o-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-o-debuginfo-0:1.9.16-3.git858756d.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.src", "7Server-RH7-RHOSE-3.9:cri-tools-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:cri-tools-debuginfo-0:1.0.0-6.rhaos3.9.git8e6013a.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-oauth-proxy-0:2.1-3.git885c9f40.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-openshift-prometheus-alert-buffer-0:0-3.gitceca8c1.el7.x86_64", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-node_exporter-0:3.9.101-1.git.1.8295224.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-prometheus-0:2.2.1-2.gitbc6058c.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.src", "7Server-RH7-RHOSE-3.9:golang-github-prometheus-promu-0:0-5.git85ceabc.el7.x86_64", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.src", "7Server-RH7-RHOSE-3.9:hawkular-openshift-agent-0:1.2.2-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.src", "7Server-RH7-RHOSE-3.9:heapster-0:1.3.0-4.el7.x86_64", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.src", "7Server-RH7-RHOSE-3.9:image-inspector-0:2.1.3-2.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.src", "7Server-RH7-RHOSE-3.9:openshift-enterprise-image-registry-0:3.8.0-2.git.216.b6b90bb.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.src", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-eventrouter-debuginfo-0:0.1-3.git5bd9251.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-0:0.0.1-9.git78d6339.el7.src", "7Server-RH7-RHOSE-3.9:openshift-external-storage-debuginfo-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-efs-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-local-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-controller-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openshift-external-storage-snapshot-provisioner-0:0.0.1-9.git78d6339.el7.x86_64", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.src", "7Server-RH7-RHOSE-3.9:openvswitch-ovn-kubernetes-0:0.1.0-3.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-0:2.2.1-2.gitbc6058c.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-alertmanager-0:0.14.0-2.git30af4d0.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-node-exporter-0:3.9.101-1.git.1.8295224.el7.x86_64", "7Server-RH7-RHOSE-3.9:prometheus-promu-0:0-5.git85ceabc.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced" } ] }
rhsa-2019_3131
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the cri-o, cri-tools, faq, ignition, openshift-external-storage and pivot RPM packages, which have been rebuilt with an updated version of golang for Red Hat OpenShift Container Platform 4.1.20.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3131", "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3131.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.20 golang security update", "tracking": { "current_release_date": "2024-11-05T21:29:30+00:00", "generator": { "date": "2024-11-05T21:29:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:3131", "initial_release_date": "2019-10-16T15:36:43+00:00", "revision_history": [ { "date": "2019-10-16T15:36:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-16T15:36:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:29:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product_id": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.13.0-3.rhaos4.1.gitb69a0b9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@0.32.0-2.git5941fc0.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@0.32.0-2.git5941fc0.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@0.32.0-2.git5941fc0.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@0.32.0-2.git5941fc0.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@0.32.0-2.git5941fc0.el8?arch=x86_64" } } }, { "category": "product_version", "name": "pivot-0:0.0.5-2.el8.x86_64", "product": { "name": "pivot-0:0.0.5-2.el8.x86_64", "product_id": "pivot-0:0.0.5-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pivot@0.0.5-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_id": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_id": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.13.0-2.rhaos4.1.gitc06001f.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.13.0-2.rhaos4.1.gitc06001f.el7?arch=x86_64" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el7.x86_64", "product": { "name": "faq-0:0.0.6-4.el7.x86_64", "product_id": "faq-0:0.0.6-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product": { "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product_id": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq-debuginfo@0.0.6-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-cephfs-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-efs-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-local-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-manila-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-controller@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-snapshot-provisioner@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product": { "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_id": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage-debuginfo@0.0.2-7.gitd3c94f0.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product_id": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product_id": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.13.0-3.rhaos4.1.gitb69a0b9.el8?arch=src" } } }, { "category": "product_version", "name": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product_id": "ignition-0:0.32.0-2.git5941fc0.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@0.32.0-2.git5941fc0.el8?arch=src" } } }, { "category": "product_version", "name": "pivot-0:0.0.5-2.el8.src", "product": { "name": "pivot-0:0.0.5-2.el8.src", "product_id": "pivot-0:0.0.5-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pivot@0.0.5-2.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product_id": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product_id": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.13.0-2.rhaos4.1.gitc06001f.el7?arch=src" } } }, { "category": "product_version", "name": "faq-0:0.0.6-4.el7.src", "product": { "name": "faq-0:0.0.6-4.el7.src", "product_id": "faq-0:0.0.6-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-4.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product": { "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product_id": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-external-storage@0.0.2-7.gitd3c94f0.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src" }, "product_reference": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64" }, "product_reference": "cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src" }, "product_reference": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64" }, "product_reference": "cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src" }, "product_reference": "faq-0:0.0.6-4.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64" }, "product_reference": "faq-0:0.0.6-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "faq-debuginfo-0:0.0.6-4.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64" }, "product_reference": "faq-debuginfo-0:0.0.6-4.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src" }, "product_reference": "openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64" }, "product_reference": "openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src" }, "product_reference": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src" }, "product_reference": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64" }, "product_reference": "cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src" }, "product_reference": "ignition-0:0.32.0-2.git5941fc0.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "pivot-0:0.0.5-2.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src" }, "product_reference": "pivot-0:0.0.5-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "pivot-0:0.0.5-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" }, "product_reference": "pivot-0:0.0.5-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-16T15:36:43+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.20, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3131" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-16T15:36:43+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.20, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3131" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.src", "7Server-RH7-RHOSE-4.1:cri-o-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.10.dev.rhaos4.1.gitbdeb2ca.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.src", "7Server-RH7-RHOSE-4.1:cri-tools-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:cri-tools-debuginfo-0:1.13.0-2.rhaos4.1.gitc06001f.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.src", "7Server-RH7-RHOSE-4.1:faq-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:faq-debuginfo-0:0.0.6-4.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-0:0.0.2-7.gitd3c94f0.el7.src", "7Server-RH7-RHOSE-4.1:openshift-external-storage-cephfs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-debuginfo-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-efs-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-local-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-manila-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-controller-0:0.0.2-7.gitd3c94f0.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-external-storage-snapshot-provisioner-0:0.0.2-7.gitd3c94f0.el7.x86_64", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.src", "8Base-RHOSE-4.1:cri-o-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debuginfo-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-o-debugsource-0:1.13.11-0.13.dev.rhaos4.1.gitbdeb2ca.el8.x86_64", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.src", "8Base-RHOSE-4.1:cri-tools-0:1.13.0-3.rhaos4.1.gitb69a0b9.el8.x86_64", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.src", "8Base-RHOSE-4.1:ignition-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-debugsource-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:ignition-validate-debuginfo-0:0.32.0-2.git5941fc0.el8.x86_64", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.src", "8Base-RHOSE-4.1:pivot-0:0.0.5-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhba-2019_3139
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 3.11.153 is now available with\nupdates to packages and images that fix several bugs and add enhancements.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 3.11.153. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2019:3138\n\nThis release fixes the following bugs:\n\n* NSX role templates referenced module output based on previous data structure. Templates were not properly populated. With this bug fix, the templates were updated to use the updated data structure and the templates are now generated with clusterIP as expected. (BZ#1753890)\n\nAll OpenShift Container Platform 3.11 users are advised to upgrade to these\nupdated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2019:3139", "url": "https://access.redhat.com/errata/RHBA-2019:3139" }, { "category": "external", "summary": "1645725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645725" }, { "category": "external", "summary": "1651583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651583" }, { "category": "external", "summary": "1678100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1678100" }, { "category": "external", "summary": "1720174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720174" }, { "category": "external", "summary": "1723924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723924" }, { "category": "external", "summary": "1734385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734385" }, { "category": "external", "summary": "1741679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741679" }, { "category": "external", "summary": "1747305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1747305" }, { "category": "external", "summary": "1751125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751125" }, { "category": "external", "summary": "1751975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751975" }, { "category": "external", "summary": "1752532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752532" }, { "category": "external", "summary": "1753890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753890" }, { "category": "external", "summary": "1754788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754788" }, { "category": "external", "summary": "1754968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754968" }, { "category": "external", "summary": "1758156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758156" }, { "category": "external", "summary": "1758235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758235" }, { "category": "external", "summary": "1758267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758267" }, { "category": "external", "summary": "1759344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759344" }, { "category": "external", "summary": "1759837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759837" }, { "category": "external", "summary": "1760166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhba-2019_3139.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 3.11 bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-05T15:54:37+00:00", "generator": { "date": "2024-11-05T15:54:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHBA-2019:3139", "initial_release_date": "2019-10-18T02:02:14+00:00", "revision_history": [ { "date": "2019-10-18T02:02:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-18T02:02:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T15:54:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.ppc64le", "product": { "name": "apb-0:1.9.8-1.el7.ppc64le", "product_id": "apb-0:1.9.8-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@1.9.8-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.11.1-2.rhaos3.11.gitedabfb5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_id": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.11.1-2.rhaos3.11.gitedabfb5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-monitor-project-lifecycle@3.11.51-2.git.59.7b59e29.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.153-1.git.1.e227636.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.153-1.git.1.e227636.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hyperkube@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hypershift@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.11.153-1.git.0.aaf3f71.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.153-1.git.1.bde8a94.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.153-1.git.1.69ca8e7.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.11.153-1.git.1.74c6913.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.153-1.git.1.a8cdc59.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.153-1.git.1.208da50.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.153-1.git.1.7b8d88b.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.153-1.git.1.a814e13.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product_id": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-alertmanager@3.11.153-1.git.1.2768abd.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.11.153-1.git.1.0e8ef36.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product_id": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus@3.11.153-1.git.1.7a486a2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.153-1.git.1.a190220.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.x86_64", "product": { "name": "apb-0:1.9.8-1.el7.x86_64", "product_id": "apb-0:1.9.8-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@1.9.8-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.11.1-2.rhaos3.11.gitedabfb5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.11.1-2.rhaos3.11.gitedabfb5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-monitor-project-lifecycle@3.11.51-2.git.59.7b59e29.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.153-1.git.1.e227636.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.153-1.git.1.e227636.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hyperkube@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hypershift@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.11.153-1.git.0.aaf3f71.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.153-1.git.1.bde8a94.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.153-1.git.1.69ca8e7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.11.153-1.git.1.74c6913.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.153-1.git.1.a8cdc59.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.153-1.git.1.208da50.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.153-1.git.1.7b8d88b.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.153-1.git.1.a814e13.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product_id": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-alertmanager@3.11.153-1.git.1.2768abd.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.11.153-1.git.1.0e8ef36.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product_id": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus@3.11.153-1.git.1.7a486a2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.153-1.git.1.a190220.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apb-0:1.9.8-1.el7.src", "product": { "name": "apb-0:1.9.8-1.el7.src", "product_id": "apb-0:1.9.8-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb@1.9.8-1.el7?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product_id": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.11.1-2.rhaos3.11.gitedabfb5.el7?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product_id": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@3.11.1568994366-1.el7?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.176.3.1569349414-1.el7.src", "product": { "name": "jenkins-0:2.176.3.1569349414-1.el7.src", "product_id": "jenkins-0:2.176.3.1569349414-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.176.3.1569349414-1.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product_id": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-monitor-project-lifecycle@3.11.51-2.git.59.7b59e29.el7?arch=src" } } }, { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.src", "product": { "name": "mediawiki-0:1.27.7-1.el7.src", "product_id": "mediawiki-0:1.27.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.153-1.git.1.e227636.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product_id": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.11.153-1.git.0.aaf3f71.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.153-1.git.1.bde8a94.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product_id": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.153-1.git.1.69ca8e7.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product_id": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.11.153-1.git.1.74c6913.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product_id": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.153-1.git.1.a8cdc59.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.153-1.git.1.7fbf681.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product_id": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.153-1.git.1.208da50.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product_id": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.153-1.git.1.7b8d88b.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.153-1.git.1.a814e13.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@3.11.153-1.git.1.2768abd.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.11.153-1.git.1.0e8ef36.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product_id": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-prometheus@3.11.153-1.git.1.7a486a2.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product_id": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.153-1.git.1.a190220.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.153-1.git.1.5f83714.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product": { "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product_id": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@3.11.153-1.git.1.073ef06.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product_id": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@3.11.153-2.git.0.ee699b5.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product": { "name": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product_id": "apb-container-scripts-0:1.9.8-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb-container-scripts@1.9.8-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "apb-devel-0:1.9.8-1.el7.noarch", "product": { "name": "apb-devel-0:1.9.8-1.el7.noarch", "product_id": "apb-devel-0:1.9.8-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apb-devel@1.9.8-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product_id": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@3.11.1568994366-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product": { "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product_id": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.176.3.1569349414-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki-doc@1.27.7-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.11.153-1.git.0.aaf3f71.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.11.153-1.git.0.aaf3f71.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@3.11.153-1.git.1.073ef06.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@3.11.153-1.git.1.073ef06.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@3.11.153-1.git.1.073ef06.el7?arch=noarch" } } }, { "category": "product_version", "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product": { "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_id": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-kuryr-kubernetes@3.11.153-1.git.1.073ef06.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@3.11.153-2.git.0.ee699b5.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-docs@3.11.153-2.git.0.ee699b5.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-playbooks@3.11.153-2.git.0.ee699b5.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-roles@3.11.153-2.git.0.ee699b5.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product": { "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_id": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@3.11.153-2.git.0.ee699b5.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le" }, "product_reference": "apb-0:1.9.8-1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src" }, "product_reference": "apb-0:1.9.8-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-0:1.9.8-1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64" }, "product_reference": "apb-0:1.9.8-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-container-scripts-0:1.9.8-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch" }, "product_reference": "apb-container-scripts-0:1.9.8-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "apb-devel-0:1.9.8-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch" }, "product_reference": "apb-devel-0:1.9.8-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64" }, "product_reference": "cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.176.3.1569349414-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch" }, "product_reference": "jenkins-0:2.176.3.1569349414-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.176.3.1569349414-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src" }, "product_reference": "jenkins-0:2.176.3.1569349414-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch" }, "product_reference": "jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src" }, "product_reference": "jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src" }, "product_reference": "mediawiki-0:1.27.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-doc-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src" }, "product_reference": "openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch" }, "product_reference": "openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src" }, "product_reference": "openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" }, "product_reference": "openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le" }, "product_reference": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64" }, "product_reference": "prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le" }, "product_reference": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" }, "product_reference": "python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T02:02:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system is applied.\n\nSee the following documentation, which will be updated shortly for release 3.11.153, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at https://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:3139" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.153-1.git.1.e227636.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.153-1.git.1.bde8a94.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.153-1.git.1.69ca8e7.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.153-1.git.1.74c6913.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.153-1.git.1.a8cdc59.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.153-1.git.1.7fbf681.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.153-1.git.1.208da50.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.153-1.git.1.7b8d88b.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.153-1.git.1.a814e13.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.153-1.git.1.0e8ef36.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.153-1.git.1.7a486a2.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.176.3.1569349414-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1568994366-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.153-2.git.0.ee699b5.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.153-2.git.0.ee699b5.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.153-1.git.1.a190220.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.153-1.git.1.5f83714.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.153-1.git.1.073ef06.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.153-1.git.1.073ef06.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.153-1.git.1.7a486a2.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.153-1.git.1.2768abd.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.153-1.git.1.0e8ef36.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.153-1.git.1.073ef06.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T02:02:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system is applied.\n\nSee the following documentation, which will be updated shortly for release 3.11.153, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at https://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2019:3139" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.src", "7Server-RH7-RHOSE-3.11:apb-0:1.9.8-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:apb-container-scripts-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:apb-devel-0:1.9.8-1.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.153-1.git.0.aaf3f71.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.153-1.git.0.aaf3f71.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.src", "7Server-RH7-RHOSE-3.11:cri-tools-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.ppc64le", "7Server-RH7-RHOSE-3.11:cri-tools-debuginfo-0:1.11.1-2.rhaos3.11.gitedabfb5.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.src", "7Server-RH7-RHOSE-3.11:openshift-monitor-project-lifecycle-0:3.11.51-2.git.59.7b59e29.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_4020
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4020", "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "JBEAP-17075", "url": "https://issues.redhat.com/browse/JBEAP-17075" }, { "category": "external", "summary": "JBEAP-17220", "url": "https://issues.redhat.com/browse/JBEAP-17220" }, { "category": "external", "summary": "JBEAP-17365", "url": "https://issues.redhat.com/browse/JBEAP-17365" }, { "category": "external", "summary": "JBEAP-17476", "url": "https://issues.redhat.com/browse/JBEAP-17476" }, { "category": "external", "summary": "JBEAP-17478", "url": "https://issues.redhat.com/browse/JBEAP-17478" }, { "category": "external", "summary": "JBEAP-17483", "url": "https://issues.redhat.com/browse/JBEAP-17483" }, { "category": "external", "summary": "JBEAP-17495", "url": "https://issues.redhat.com/browse/JBEAP-17495" }, { "category": "external", "summary": "JBEAP-17496", "url": "https://issues.redhat.com/browse/JBEAP-17496" }, { "category": "external", "summary": "JBEAP-17513", "url": "https://issues.redhat.com/browse/JBEAP-17513" }, { "category": "external", "summary": "JBEAP-17521", "url": "https://issues.redhat.com/browse/JBEAP-17521" }, { "category": "external", "summary": "JBEAP-17523", "url": "https://issues.redhat.com/browse/JBEAP-17523" }, { "category": "external", "summary": "JBEAP-17547", "url": "https://issues.redhat.com/browse/JBEAP-17547" }, { "category": "external", "summary": "JBEAP-17548", "url": "https://issues.redhat.com/browse/JBEAP-17548" }, { "category": "external", "summary": "JBEAP-17560", "url": "https://issues.redhat.com/browse/JBEAP-17560" }, { "category": "external", "summary": "JBEAP-17579", "url": "https://issues.redhat.com/browse/JBEAP-17579" }, { "category": "external", "summary": "JBEAP-17582", "url": "https://issues.redhat.com/browse/JBEAP-17582" }, { "category": "external", "summary": "JBEAP-17605", "url": "https://issues.redhat.com/browse/JBEAP-17605" }, { "category": "external", "summary": "JBEAP-17631", "url": "https://issues.redhat.com/browse/JBEAP-17631" }, { "category": "external", "summary": "JBEAP-17647", "url": "https://issues.redhat.com/browse/JBEAP-17647" }, { "category": "external", "summary": "JBEAP-17665", "url": "https://issues.redhat.com/browse/JBEAP-17665" }, { "category": "external", "summary": "JBEAP-17722", "url": "https://issues.redhat.com/browse/JBEAP-17722" }, { "category": "external", "summary": "JBEAP-17874", "url": "https://issues.redhat.com/browse/JBEAP-17874" }, { "category": "external", "summary": "JBEAP-17880", "url": "https://issues.redhat.com/browse/JBEAP-17880" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4020.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 8 security update", "tracking": { "current_release_date": "2024-11-05T21:38:51+00:00", "generator": { "date": "2024-11-05T21:38:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:4020", "initial_release_date": "2019-11-26T19:57:14+00:00", "revision_history": [ { "date": "2019-11-26T19:57:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-26T19:57:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:38:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.2 for RHEL 8", "product": { "name": "Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketbox@5.0.3-6.Final_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_id": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketbox-infinispan@5.0.3-6.Final_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.26-2.SP3_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.2.10-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.2.10-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.2.10-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.2.10-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.5-5.SP3_redhat_00003.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-byte-buddy@1.9.11-1.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.4.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.4.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.4.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.4.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.4.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.4.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.4.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.4.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.4.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client-microprofile@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.4.4-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-client-common@1.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-ejb-client@1.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-naming-client@1.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-transaction-client@1.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.0.17-2.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.6.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate@5.3.13-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-core@5.3.13-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-entitymanager@5.3.13-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-envers@5.3.13-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-java8@5.3.13-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-bindings@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-wildfly8@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-api@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-common@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-config@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-idm-api@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-idm-impl@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-idm-simple-schema@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_id": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-impl@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.7.6-2.SP1_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly13.0-server@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly14.0-server@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0-to-eap7.2@1.3.1-6.Final_redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl@1.0.8-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-java@1.0.8-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-remoting@5.0.16-2.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-yasson@1.0.5-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-genericjms@2.0.2-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-msc@1.4.11-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.2.5-4.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.2.5-4.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.2.5-4.GA_redhat_00002.1.el8eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product_id": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketbox@5.0.3-6.Final_redhat_00005.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product_id": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.26-2.SP3_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product_id": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.2.10-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product_id": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-glassfish-jsf@2.3.5-5.SP3_redhat_00003.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product_id": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-byte-buddy@1.9.11-1.redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.4.18-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product_id": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.6.1-7.SP7_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.4.4-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-http-client@1.0.17-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.0.17-2.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.6.5-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate@5.3.13-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_id": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-bindings@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_id": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-20.SP12_redhat_00009.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.7.6-2.SP1_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product_id": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.3.1-6.Final_redhat_00006.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl@1.0.8-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-remoting@5.0.16-2.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product_id": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-yasson@1.0.5-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-genericjms@2.0.2-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-msc@1.4.11-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product_id": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.2.5-4.GA_redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64@1.0.8-5.Final_redhat_00001.1.el8eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64@1.0.8-5.Final_redhat_00001.1.el8eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_id": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64-debuginfo@1.0.8-5.Final_redhat_00001.1.el8eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src" }, "product_reference": "eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src" }, "product_reference": "eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src" }, "product_reference": "eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src" }, "product_reference": "eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch" }, "product_reference": "eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src" }, "product_reference": "eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.2" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.2 for RHEL 8", "product_id": "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "F\u00e1bio Magalh\u00e3es de Andrade" ], "organization": "Sonda Ativas" }, { "names": [ "Juliano de Castro Santos", "Leonard Lunardi" ], "organization": "UnimedBH" } ], "cve": "CVE-2019-14838", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1751227" } ], "notes": [ { "category": "description", "text": "It was found that Wildfly users had default user permissions set incorrectly. A malicious user could use this flaw to access unauthorized controls for the application server.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14838" }, { "category": "external", "summary": "RHBZ#1751227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1751227" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14838" }, { "category": "external", "summary": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14838" } ], "release_date": "2019-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default" }, { "cve": "CVE-2019-14843", "cwe": { "id": "CWE-592", "name": "CWE-592" }, "discovery_date": "2019-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-security-manager: security manager authorization bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14843" }, { "category": "external", "summary": "RHBZ#1752980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14843" } ], "release_date": "2019-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-26T19:57:14+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details about how to apply this update, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "category": "workaround", "details": "This flaw only affects the Security Manager running under JDK 11 or 8. To mitigate exposure to this flaw, do not run under those JDK versions.", "product_ids": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-0:3.2.10-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-apache-cxf-rt-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-services-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-apache-cxf-tools-0:3.2.10-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-byte-buddy-0:1.9.11-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-glassfish-jsf-0:2.3.5-5.SP3_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hal-console-0:3.0.17-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-0:5.3.13-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-hibernate-core-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-entitymanager-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-envers-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-hibernate-java8-0:5.3.13-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-0:1.4.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-ironjacamar-common-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-common-spi-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-api-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-core-impl-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-deployers-common-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-jdbc-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-ironjacamar-validator-0:1.4.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-genericjms-0:2.0.2-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-msc-0:1.4.11-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-remoting-0:5.0.16-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-0:1.3.1-6.Final_redhat_00006.1.el8eap.src", "8Base-JBEAP-7.2:eap7-jboss-server-migration-cli-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-core-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap6.4-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly10.1-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly11.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly12.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly13.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly14.0-server-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly8.2-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-server-migration-wildfly9.0-to-eap7.2-0:1.3.1-6.Final_redhat_00006.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-jboss-xnio-base-0:3.7.6-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketbox-0:5.0.3-6.Final_redhat_00005.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketbox-infinispan-0:5.0.3-6.Final_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-bindings-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-common-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-config-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-federation-0:2.5.5-20.SP12_redhat_00009.1.el8eap.src", "8Base-JBEAP-7.2:eap7-picketlink-idm-api-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-idm-simple-schema-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-impl-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-picketlink-wildfly8-0:2.5.5-20.SP12_redhat_00009.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-0:3.6.1-7.SP7_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-resteasy-atom-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-cdi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-client-microprofile-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-crypto-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jackson2-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxb-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jaxrs-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jettison-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jose-jwt-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-jsapi-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-binding-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-json-p-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-multipart-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-rxjava2-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-spring-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-validator-provider-11-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-resteasy-yaml-provider-0:3.6.1-7.SP7_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-undertow-0:2.0.26-2.SP3_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-0:7.2.5-4.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-0:1.6.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-elytron-tool-0:1.4.4-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-http-client-common-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-ejb-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-naming-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-http-transaction-client-0:1.0.17-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-javadocs-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-modules-0:7.2.5-4.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-0:1.0.8-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-java-0:1.0.8-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-wildfly-openssl-linux-x86_64-debuginfo-0:1.0.8-5.Final_redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.2:eap7-yasson-0:1.0.5-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "wildfly-security-manager: security manager authorization bypass" } ] }
rhsa-2019_2661
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the openshift and atomic-enterprise-service-catalog packages is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Both the openshift and atomic-enterprise-service-catalog packages have been rebuilt with updates versions of golang. The golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2661", "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2661.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Container Platform 4.1 openshift RPM security update", "tracking": { "current_release_date": "2024-11-05T21:23:54+00:00", "generator": { "date": "2024-11-05T21:23:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2661", "initial_release_date": "2019-09-11T05:53:28+00:00", "revision_history": [ { "date": "2019-09-11T05:53:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-11T05:53:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:23:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.14-201908290858.git.1.28cc9ff.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@4.1.14-201908290858.git.1.28cc9ff.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.1.14-201908290858.git.0.3bd3467.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.14-201908290858.git.0.3bd3467.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_id": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.1.14-201908290858.git.0.3bd3467.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.1.14-201908290858.git.0.3bd3467.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.1.14-201908290858.git.0.3bd3467.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_id": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.1.14-201908290858.git.0.3bd3467.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product_id": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@4.1.14-201908290858.git.1.28cc9ff.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product_id": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.1.14-201908290858.git.0.3bd3467.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product_id": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.1.14-201908290858.git.0.3bd3467.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src" }, "product_reference": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src" }, "product_reference": "openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T05:53:28+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2661" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-11T05:53:28+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.14, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.1/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2661" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.src", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:atomic-enterprise-service-catalog-svcat-1:4.1.14-201908290858.git.1.28cc9ff.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el7.src", "7Server-RH7-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "7Server-RH7-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el7.x86_64", "8Base-RHOSE-4.1:openshift-0:4.1.14-201908290858.git.0.3bd3467.el8.src", "8Base-RHOSE-4.1:openshift-clients-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-clients-redistributable-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64", "8Base-RHOSE-4.1:openshift-hyperkube-0:4.1.14-201908290858.git.0.3bd3467.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" } ] }
rhsa-2019_2796
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for skydive is now available for Red Hat OpenStack Platform 14.0 (Rocky).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Skydive is an open source real-time network topology and protocols analyzer.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2796", "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2796.json" } ], "title": "Red Hat Security Advisory: skydive security update", "tracking": { "current_release_date": "2024-11-05T21:25:13+00:00", "generator": { "date": "2024-11-05T21:25:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2796", "initial_release_date": "2019-09-19T02:32:15+00:00", "revision_history": [ { "date": "2019-09-19T02:32:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-19T02:32:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:25:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 14.0", "product": { "name": "Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:14::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive@0.20.5-2.el7ost?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive-agent@0.20.5-2.el7ost?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive-analyzer@0.20.5-2.el7ost?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive-ansible@0.20.5-2.el7ost?arch=ppc64le" } } }, { "category": "product_version", "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product_id": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive-debuginfo@0.20.5-2.el7ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive@0.20.5-2.el7ost?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive-agent@0.20.5-2.el7ost?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive-analyzer@0.20.5-2.el7ost?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive-ansible@0.20.5-2.el7ost?arch=x86_64" } } }, { "category": "product_version", "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product_id": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive-debuginfo@0.20.5-2.el7ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "skydive-0:0.20.5-2.el7ost.src", "product": { "name": "skydive-0:0.20.5-2.el7ost.src", "product_id": "skydive-0:0.20.5-2.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive@0.20.5-2.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product": { "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product_id": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/skydive-selinux@0.20.5-2.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.src as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src" }, "product_reference": "skydive-0:0.20.5-2.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-agent-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-agent-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-agent-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-agent-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-ansible-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-ansible-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le" }, "product_reference": "skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64" }, "product_reference": "skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "skydive-selinux-0:0.20.5-2.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" }, "product_reference": "skydive-selinux-0:0.20.5-2.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-19T02:32:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.src", "7Server-RH7-RHOS-14.0:skydive-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-agent-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-analyzer-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-ansible-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.ppc64le", "7Server-RH7-RHOS-14.0:skydive-debuginfo-0:0.20.5-2.el7ost.x86_64", "7Server-RH7-RHOS-14.0:skydive-selinux-0:0.20.5-2.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
rhsa-2019_2766
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for gRPC, included in multus-cni-container, operator-lifecycle-manager-container, and operator-registry-container is now available for Red Hat OpenShift Container Platform 4.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains updated container images for multus-cni, operator-lifecycle-manager, and operator-registry in Red Hat OpenShift Container Platform 4.1.15. Each of these container images includes gRPC, which has been updated with the below fixes.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2766", "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2766.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Enterprise 4.1.15 gRPC security update", "tracking": { "current_release_date": "2024-11-05T21:24:24+00:00", "generator": { "date": "2024-11-05T21:24:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2019:2766", "initial_release_date": "2019-09-12T18:32:52+00:00", "revision_history": [ { "date": "2019-09-12T18:32:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-12T18:32:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:24:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.1", "product": { "name": "Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.1::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product_id": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.1.15-201909041605" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.1.15-201909041605" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product_id": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.1.15-201909041605" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64 as a component of Red Hat OpenShift Container Platform 4.1", "product_id": "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-12T18:32:52+00:00", "details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.z, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html", "product_ids": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2766" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.1:openshift4/ose-multus-cni@sha256:38bc93888a2577e90168a0d4f7996d43f38878e11db255b26e58f5aa50b9df56_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-lifecycle-manager@sha256:0eca3cf5068a4c366f8f8a0fd4891d9cd86fe239764d189d37b8938196e323a1_amd64", "7Server-RH7-RHOSE-4.1:openshift4/ose-operator-registry@sha256:79a386249506345846398f6bb26963f2d1e19dde1242003f42332718847be9c5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" } ] }
rhsa-2020_0922
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.6 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.6.0 serves as a replacement for Red Hat AMQ Broker 7.5.0, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0922", "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0922.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.6 release and security update", "tracking": { "current_release_date": "2024-11-05T21:55:23+00:00", "generator": { "date": "2024-11-05T21:55:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:0922", "initial_release_date": "2020-03-23T08:21:33+00:00", "revision_history": [ { "date": "2020-03-23T08:21:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-23T08:21:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T21:55:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ", "product": { "name": "Red Hat AMQ", "product_id": "Red Hat AMQ", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
wid-sec-w-2022-0770
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in IBM DB2 ausnutzen, um seine Privilegien zu erh\u00f6hen oder einen Denial of Service zu verursachen", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0770 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-0770.json" }, { "category": "self", "summary": "WID-SEC-2022-0770 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0770" }, { "category": "external", "summary": "IBM Security Bulletin 6198380 vom 2020-04-23", "url": "https://www.ibm.com/support/pages/node/6198380" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2603 vom 2020-06-17", "url": "https://access.redhat.com/errata/RHSA-2020:2603" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4807 vom 2020-11-04", "url": "https://access.redhat.com/errata/RHSA-2020:4807" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3225 vom 2021-08-20", "url": "https://access.redhat.com/errata/RHSA-2021:3225" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-115 vom 2022-05-27", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-115/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 6605881 vom 2022-07-21", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-have-been-identified-in-ibm-db2-shipped-with-ibm-puredata-system-for-operational-analytics/" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-070 vom 2024-02-03", "url": "https://www.dell.com/support/kbdoc/000221770/dsa-2024-=" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-144 vom 2023-10-03", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-144/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 7153639 vom 2024-05-17", "url": "https://www.ibm.com/support/pages/node/7153639" } ], "source_lang": "en-US", "title": "IBM DB2: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-16T22:00:00.000+00:00", "generator": { "date": "2024-05-17T08:33:37.793+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0770", "initial_release_date": "2020-04-23T22:00:00.000+00:00", "revision_history": [ { "date": "2020-04-23T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-06-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-03T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-19T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-10-03T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2024-02-04T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-05-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } }, { "category": "product_version_range", "name": "\u003cAnalyzer 10.9.3-00", "product": { "name": "Hitachi Ops Center \u003cAnalyzer 10.9.3-00", "product_id": "T030196", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:analyzer_10.9.3-00" } } }, { "category": "product_version_range", "name": "\u003cViewpoint 10.9.3-00", "product": { "name": "Hitachi Ops Center \u003cViewpoint 10.9.3-00", "product_id": "T030197", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:viewpoint_10.9.3-00" } } } ], "category": "product_name", "name": "Ops Center" } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.1", "product": { "name": "IBM DB2 11.1", "product_id": "342000", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:11.1" } } }, { "category": "product_version", "name": "11.5", "product": { "name": "IBM DB2 11.5", "product_id": "695419", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:11.5" } } } ], "category": "product_name", "name": "DB2" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0001", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2009-0001" }, { "cve": "CVE-2014-0114", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2014-0114" }, { "cve": "CVE-2014-0193", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2014-0193" }, { "cve": "CVE-2014-3488", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2014-3488" }, { "cve": "CVE-2015-2156", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2015-2156" }, { "cve": "CVE-2016-2402", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2016-2402" }, { "cve": "CVE-2017-12972", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2017-12972" }, { "cve": "CVE-2017-12973", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2017-12973" }, { "cve": "CVE-2017-12974", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2017-12974" }, { "cve": "CVE-2017-18640", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2017-18640" }, { "cve": "CVE-2017-3734", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2017-3734" }, { "cve": "CVE-2017-5637", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2017-5637" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-11771", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2018-11771" }, { "cve": "CVE-2018-8009", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2018-8009" }, { "cve": "CVE-2018-8012", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2018-8012" }, { "cve": "CVE-2019-0201", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-0201" }, { "cve": "CVE-2019-10086", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-10086" }, { "cve": "CVE-2019-10172", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-10172" }, { "cve": "CVE-2019-10202", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-10202" }, { "cve": "CVE-2019-12402", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-12402" }, { "cve": "CVE-2019-16869", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-16869" }, { "cve": "CVE-2019-17195", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-17195" }, { "cve": "CVE-2019-17571", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-17571" }, { "cve": "CVE-2019-9512", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9518", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00Z", "title": "CVE-2019-9518" } ] }
var-201908-0422
Vulnerability from variot
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. Apple SwiftNI , Apache Traffic Server , Debian GNU/Linux Used in HTTP/2 Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HTTP/2 is the second version of the hypertext transfer protocol, which is mainly used to ensure the communication between the client and the server. A resource management error vulnerability exists in HTTP/2. An attacker could exploit this vulnerability to cause a denial of service. Bugs fixed (https://bugzilla.redhat.com/):
1649870 - CVE-2019-14820 keycloak: adapter endpoints are exposed via arbitrary URLs 1690628 - CVE-2019-3875 keycloak: missing signatures validation on CRL used to verify client certificates 1728609 - CVE-2019-10201 keycloak: SAML broker does not check existence of signature on document allowing any user impersonation 1729261 - CVE-2019-10199 keycloak: CSRF check missing in My Resources functionality in the Account Console 1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth 1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth 1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth 1738673 - CVE-2019-10219 hibernate-validator: safeHTML validator allows XSS 1741860 - CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service 1749487 - CVE-2019-14832 keycloak: cross-realm user access auth bypass 1751227 - CVE-2019-14838 wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default 1755831 - CVE-2019-16335 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource 1755849 - CVE-2019-14540 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig 1758167 - CVE-2019-17267 jackson-databind: Serialization gadgets in classes of the ehcache package 1758171 - CVE-2019-14892 jackson-databind: Serialization gadgets in classes of the commons-configuration package 1758182 - CVE-2019-14893 jackson-databind: Serialization gadgets in classes of the xalan package 1758187 - CVE-2019-16942 jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources. 1758191 - CVE-2019-16943 jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource 1764607 - CVE-2019-0210 thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol 1764612 - CVE-2019-0205 thrift: Endless loop when feed with specific input data 1764658 - CVE-2019-12400 xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source 1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default 1772008 - CVE-2019-14887 wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use 1772464 - CVE-2019-14888 undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS 1775293 - CVE-2019-17531 jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db. 1793154 - CVE-2019-20330 jackson-databind: lacks certain net.sf.ehcache blocking 1796225 - CVE-2020-7238 netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling 1802444 - CVE-2020-1729 SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader 1815470 - CVE-2020-10673 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution 1815495 - CVE-2020-10672 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution 1816170 - CVE-2019-12406 cxf: does not restrict the number of message attachments 1816175 - CVE-2019-12419 cxf: OpenId Connect token service does not properly validate the clientId 1816330 - CVE-2020-8840 jackson-databind: Lacks certain xbean-reflect/JNDI blocking 1816332 - CVE-2020-9546 jackson-databind: Serialization gadgets in shaded-hikari-config 1816337 - CVE-2020-9547 jackson-databind: Serialization gadgets in ibatis-sqlmap 1816340 - CVE-2020-9548 jackson-databind: Serialization gadgets in anteros-core 1819208 - CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider 1819212 - CVE-2020-10969 jackson-databind: Serialization gadgets in javax.swing.JEditorPane 1821304 - CVE-2020-11111 jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory 1821311 - CVE-2020-11112 jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider 1821315 - CVE-2020-11113 jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime 1826798 - CVE-2020-11620 jackson-databind: Serialization gadgets in commons-jelly:commons-jelly 1826805 - CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop
- Description:
The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
The References section of this erratum contains a download link (you must log in to download the update).
The JBoss server process must be restarted for the update to take effect. JIRA issues fixed (https://issues.jboss.org/):
KEYCLOAK-11792 - keycloak-spring-boot-2-adapter is missing from Red Hat maven and incremental client adapter zip
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update Advisory ID: RHSA-2019:4019-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2019:4019 Issue date: 2019-11-26 CVE Names: CVE-2019-9511 CVE-2019-9512 CVE-2019-9514 CVE-2019-9515 CVE-2019-14838 CVE-2019-14843 ==================================================================== 1. Summary:
An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat JBoss EAP 7.2 for RHEL 7 Server - noarch, x86_64
- Description:
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.
This release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
-
undertow: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
-
undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
-
undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
-
undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
-
wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default (CVE-2019-14838)
-
wildfly: wildfly-security-manager: security manager authorization bypass (CVE-2019-14843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth 1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth 1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth 1741860 - CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service 1751227 - CVE-2019-14838 wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default 1752980 - CVE-2019-14843 wildfly-security-manager: security manager authorization bypass
- JIRA issues fixed (https://issues.jboss.org/):
JBEAP-17075 - (7.2.z) Upgrade yasson from 1.0.2.redhat-00001 to 1.0.5 JBEAP-17220 - (7.2.x) HHH-13504 Upgrade ByteBuddy to 1.9.11 JBEAP-17365 - GSS Upgrade RESTEasy from 3.6.1.SP6 to 3.6.1.SP7 JBEAP-17476 - GSS Upgrade Generic JMS RA 2.0.2.Final JBEAP-17478 - GSS Upgrade JBoss Remoting from 5.0.14.SP1 to 5.0.16.Final JBEAP-17483 - GSS Upgrade Apache CXF from 3.2.9 to 3.2.10 JBEAP-17495 - (7.2.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00007 to 2.5.5.SP12-redhat-00009 JBEAP-17496 - (7.2.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00007 to 2.5.5.SP12-redhat-00009 JBEAP-17513 - GSS Upgrade Hibernate ORM from 5.3.11.SP1 to 5.3.13 JBEAP-17521 - (7.2.z) Upgrade picketbox from 5.0.3.Final-redhat-00004 to 5.0.3.Final-redhat-00005 JBEAP-17523 - GSS Upgrade wildfly-core from 6.0.16 to 6.0.17 JBEAP-17547 - GSS Upgrade Elytron-Tool from 1.4.3 to 1.4.4.Final JBEAP-17548 - GSS Upgrade Elytron from 1.6.4.Final-redhat-00001 to 1.6.5.Final-redhat-00001 JBEAP-17560 - GSS Upgrade HAL from 3.0.16 to 3.0.17 JBEAP-17579 - GSS Upgrade JBoss MSC from 1.4.8 to 1.4.11 JBEAP-17582 - GSS Upgrade JSF based on Mojarra 2.3.5.SP3-redhat-00002 to 2.3.5.SP3-redhat-00003 JBEAP-17604 - Tracker bug for the EAP 7.2.5 release for RHEL-7 JBEAP-17631 - GSS Upgrade Undertow from 2.0.25.SP1 to 2.0.26.SP3 JBEAP-17647 - GSS Upgrade IronJacamar from 1.4.17.Final to 1.4.18.Final JBEAP-17665 - GSS Upgrade XNIO from 3.7.3.Final-redhat-00001 to 3.7.6.Final JBEAP-17722 - GSS Upgrade wildfly-http-client from 1.0.15.Final-redhat-00001 to 1.0.17.Final JBEAP-17874 - (7.2.z) Upgrade to wildfly-openssl 1.0.8 JBEAP-17880 - (7.2.z) Upgrade XNIO from 3.7.6.Final-redhat-00001 to 3.7.6.SP1
- Package List:
Red Hat JBoss EAP 7.2 for RHEL 7 Server:
Source: eap7-apache-cxf-3.2.10-1.redhat_00001.1.el7eap.src.rpm eap7-byte-buddy-1.9.11-1.redhat_00002.1.el7eap.src.rpm eap7-glassfish-jsf-2.3.5-5.SP3_redhat_00003.1.el7eap.src.rpm eap7-hal-console-3.0.17-2.Final_redhat_00001.1.el7eap.src.rpm eap7-hibernate-5.3.13-1.Final_redhat_00001.1.el7eap.src.rpm eap7-ironjacamar-1.4.18-1.Final_redhat_00001.1.el7eap.src.rpm eap7-jboss-genericjms-2.0.2-1.Final_redhat_00001.1.el7eap.src.rpm eap7-jboss-msc-1.4.11-1.Final_redhat_00001.1.el7eap.src.rpm eap7-jboss-remoting-5.0.16-2.Final_redhat_00001.1.el7eap.src.rpm eap7-jboss-server-migration-1.3.1-6.Final_redhat_00006.1.el7eap.src.rpm eap7-jboss-xnio-base-3.7.6-2.SP1_redhat_00001.1.el7eap.src.rpm eap7-picketbox-5.0.3-6.Final_redhat_00005.1.el7eap.src.rpm eap7-picketlink-bindings-2.5.5-20.SP12_redhat_00009.1.el7eap.src.rpm eap7-picketlink-federation-2.5.5-20.SP12_redhat_00009.1.el7eap.src.rpm eap7-resteasy-3.6.1-7.SP7_redhat_00001.1.el7eap.src.rpm eap7-undertow-2.0.26-2.SP3_redhat_00001.1.el7eap.src.rpm eap7-wildfly-7.2.5-4.GA_redhat_00002.1.el7eap.src.rpm eap7-wildfly-elytron-1.6.5-1.Final_redhat_00001.1.el7eap.src.rpm eap7-wildfly-elytron-tool-1.4.4-1.Final_redhat_00001.1.el7eap.src.rpm eap7-wildfly-http-client-1.0.17-1.Final_redhat_00001.1.el7eap.src.rpm eap7-wildfly-openssl-1.0.8-1.Final_redhat_00001.1.el7eap.src.rpm eap7-wildfly-openssl-linux-x86_64-1.0.8-5.Final_redhat_00001.1.el7eap.src.rpm eap7-yasson-1.0.5-1.redhat_00001.1.el7eap.src.rpm
noarch: eap7-apache-cxf-3.2.10-1.redhat_00001.1.el7eap.noarch.rpm eap7-apache-cxf-rt-3.2.10-1.redhat_00001.1.el7eap.noarch.rpm eap7-apache-cxf-services-3.2.10-1.redhat_00001.1.el7eap.noarch.rpm eap7-apache-cxf-tools-3.2.10-1.redhat_00001.1.el7eap.noarch.rpm eap7-byte-buddy-1.9.11-1.redhat_00002.1.el7eap.noarch.rpm eap7-glassfish-jsf-2.3.5-5.SP3_redhat_00003.1.el7eap.noarch.rpm eap7-hal-console-3.0.17-2.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-5.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-core-5.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-entitymanager-5.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-envers-5.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-java8-5.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-ironjacamar-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-ironjacamar-common-api-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-ironjacamar-common-impl-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-ironjacamar-common-spi-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-ironjacamar-core-api-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-ironjacamar-core-impl-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-ironjacamar-deployers-common-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-ironjacamar-jdbc-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-ironjacamar-validator-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-jboss-genericjms-2.0.2-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-jboss-msc-1.4.11-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-jboss-remoting-5.0.16-2.Final_redhat_00001.1.el7eap.noarch.rpm eap7-jboss-server-migration-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-cli-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-core-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap6.4-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap6.4-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap7.0-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap7.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap7.1-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap7.1-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly10.0-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly10.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly10.1-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly10.1-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly11.0-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly11.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly12.0-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly12.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly13.0-server-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly14.0-server-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly8.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly8.2-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly9.0-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly9.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm eap7-jboss-xnio-base-3.7.6-2.SP1_redhat_00001.1.el7eap.noarch.rpm eap7-picketbox-5.0.3-6.Final_redhat_00005.1.el7eap.noarch.rpm eap7-picketbox-infinispan-5.0.3-6.Final_redhat_00005.1.el7eap.noarch.rpm eap7-picketlink-api-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm eap7-picketlink-bindings-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm eap7-picketlink-common-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm eap7-picketlink-config-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm eap7-picketlink-federation-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm eap7-picketlink-idm-api-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm eap7-picketlink-idm-impl-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm eap7-picketlink-idm-simple-schema-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm eap7-picketlink-impl-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm eap7-picketlink-wildfly8-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm eap7-resteasy-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-atom-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-cdi-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-client-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-client-microprofile-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-crypto-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jackson-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jackson2-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jaxb-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jaxrs-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jettison-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jose-jwt-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jsapi-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-json-binding-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-json-p-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-multipart-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-rxjava2-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-spring-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-validator-provider-11-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-yaml-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm eap7-undertow-2.0.26-2.SP3_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-7.2.5-4.GA_redhat_00002.1.el7eap.noarch.rpm eap7-wildfly-elytron-1.6.5-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-elytron-tool-1.4.4-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-http-client-common-1.0.17-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-http-ejb-client-1.0.17-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-http-naming-client-1.0.17-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-http-transaction-client-1.0.17-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-java-jdk11-7.2.5-4.GA_redhat_00002.1.el7eap.noarch.rpm eap7-wildfly-java-jdk8-7.2.5-4.GA_redhat_00002.1.el7eap.noarch.rpm eap7-wildfly-javadocs-7.2.5-4.GA_redhat_00002.1.el7eap.noarch.rpm eap7-wildfly-modules-7.2.5-4.GA_redhat_00002.1.el7eap.noarch.rpm eap7-wildfly-openssl-1.0.8-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-openssl-java-1.0.8-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-yasson-1.0.5-1.redhat_00001.1.el7eap.noarch.rpm
x86_64: eap7-wildfly-openssl-linux-x86_64-1.0.8-5.Final_redhat_00001.1.el7eap.x86_64.rpm eap7-wildfly-openssl-linux-x86_64-debuginfo-1.0.8-5.Final_redhat_00001.1.el7eap.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXd2Ev9zjgjWX9erEAQjW/BAAl1q46jFIklzXGQYqCBNoHo/OJpqbB21F sqHX3rOeRckVrjfzsYuJmGFFOjC9IXcLslr7Ps6x6SNxvbozmbDPv703SP1RNzWy +4IqMa8tqDyNNPxtcIMBGIwvmCRpC/FgvM4qlPQ9TdmXpITlIXq8n1m8Ye5EJAAk btHtkJeR81pob5xBS21CFoiNZOOWT17tyYlxpPRH69DPs9GSf6VUQGplVjWhIyXC nc+DUt5vRIor3RmIBqwiY3Cm2x1veKliZIU11uanyy/OpQ4fngCQPqQv2d/246xQ tevUzg52+/YTr2HB5p4YVEBWlmhtNLvlNmaYYPoz4hvKgZY3DBfAVLvMToS7aHZz tbOI+1ACdzzkXzaOmxTu5E/omvvgLOkRQ+WPS/AzHq1v7M8tFCZ9y3Q/VByxTCLy weXO5udaWf4jV8s8JAiT2Ugl93qxv06UJq+zB2yQ9HwNGCYGt1eWSZhGCbLp5AM+ lI3X+McTnbHik/xvvmOgyyRnvJUFBai+AtvAdUqN8uTf//vP0DSd4LL406MQ/bNF 3k2Rn52husN69bwsM8ZY3EpddtPOwPIVTD4zZy4+Bw25baVGKXQTQJMBMRVsduSb KKJgjKd93kXyZ3i//eu+VAMJhKc1QNVIU6HEcCpyx5qpZyJnomTb01VsmRkE/k+O 4I3dv+TPBuU=aKfk -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description:
AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. For further information, refer to the release notes linked to in the References section. 8) - aarch64, noarch, ppc64le, s390x, x86_64
- Description:
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Bug Fix(es):
-
avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)
-
backport json-file logging support to 1.4.2 (BZ#1770176)
-
Selinux won't allow SCTP inter pod communication (BZ#1774382)
-
Summary:
This is a security update for JBoss EAP Continuous Delivery 18.0. Description:
Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. JIRA issues fixed (https://issues.jboss.org/):
KEYCLOAK-11816 - Tracker bug for the RH-SSO 7.3.5 release for RHEL7
Installation instructions are available from the Fuse 7.6.0 product documentation page: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/
- Bugs fixed (https://bugzilla.redhat.com/):
1399546 - CVE-2015-9251 js-jquery: Cross-site scripting via cross-domain ajax requests 1432858 - CVE-2017-5929 logback: Serialization vulnerability in SocketServer and ServerSocketReceiver 1591854 - CVE-2017-16012 js-jquery: XSS in responses from cross-origin ajax requests 1618573 - CVE-2018-11771 apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip 1643043 - CVE-2018-15756 springframework: DoS Attack via Range Requests 1693777 - CVE-2019-3888 undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed 1703469 - CVE-2019-10174 infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods 1709860 - CVE-2019-5427 c3p0: loading XML configuration leads to denial of service 1713068 - CVE-2019-10184 undertow: Information leak in requests for directories without trailing slashes 1725795 - CVE-2019-12814 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201908-0422", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "traffic server", "scope": "gte", "trust": 1.0, "vendor": "apache", "version": "8.0.0" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "12.8.1" }, { "model": "swiftnio", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "1.4.0" }, { "model": "traffic server", "scope": "gte", "trust": 1.0, "vendor": "apache", "version": "7.0.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "traffic server", "scope": "lte", "trust": 1.0, "vendor": "apache", "version": "7.1.6" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "10.16.3" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "8.16.1" }, { "model": "node.js", "scope": "lte", "trust": 1.0, "vendor": "nodejs", "version": "10.12.0" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "12.0.0" }, { "model": "traffic server", "scope": "lte", "trust": 1.0, "vendor": "apache", "version": "8.0.3" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "8.9.0" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "10.0.0" }, { "model": "swiftnio", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "1.0.0" }, { "model": "node.js", "scope": "lte", "trust": 1.0, "vendor": "nodejs", "version": "8.8.1" }, { "model": "traffic server", "scope": "gte", "trust": 1.0, "vendor": "apache", "version": "6.0.0" }, { "model": "traffic server", "scope": "lte", "trust": 1.0, "vendor": "apache", "version": "6.2.3" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "10.13.0" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "8.0.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "akamai", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "amazon", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apache traffic server", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cloudflare", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "envoy", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "facebook", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "go programming language", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "litespeed", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netty", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "node js", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "synology", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "twisted", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "grpc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nghttp2", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nginx", "version": null }, { "model": "traffic server", "scope": null, "trust": 0.8, "vendor": "apache", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "swiftnio", "scope": null, "trust": 0.8, "vendor": "apple", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#605641" }, { "db": "JVNDB", "id": "JVNDB-2019-008112" }, { "db": "NVD", "id": "CVE-2019-9512" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "10.12", "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "14.04", "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.3", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.6", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.3", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "8.8.1", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "10.12.0", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "12.8.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "10.16.3", "versionStartIncluding": "10.13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "8.16.1", "versionStartIncluding": "8.9.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-9512" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "157741" }, { "db": "PACKETSTORM", "id": "156209" }, { "db": "PACKETSTORM", "id": "155480" }, { "db": "PACKETSTORM", "id": "155520" }, { "db": "PACKETSTORM", "id": "155484" }, { "db": "PACKETSTORM", "id": "157214" }, { "db": "PACKETSTORM", "id": "155704" }, { "db": "PACKETSTORM", "id": "158095" }, { "db": "PACKETSTORM", "id": "155518" }, { "db": "PACKETSTORM", "id": "156941" } ], "trust": 1.0 }, "cve": "CVE-2019-9512", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-9512", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-160947", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "cret@cert.org", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-9512", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-9512", "trust": 1.8, "value": "HIGH" }, { "author": "cret@cert.org", "id": "CVE-2019-9512", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201908-925", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-160947", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-160947" }, { "db": "JVNDB", "id": "JVNDB-2019-008112" }, { "db": "CNNVD", "id": "CNNVD-201908-925" }, { "db": "NVD", "id": "CVE-2019-9512" }, { "db": "NVD", "id": "CVE-2019-9512" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. Apple SwiftNI , Apache Traffic Server , Debian GNU/Linux Used in HTTP/2 Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HTTP/2 is the second version of the hypertext transfer protocol, which is mainly used to ensure the communication between the client and the server. A resource management error vulnerability exists in HTTP/2. An attacker could exploit this vulnerability to cause a denial of service. Bugs fixed (https://bugzilla.redhat.com/):\n\n1649870 - CVE-2019-14820 keycloak: adapter endpoints are exposed via arbitrary URLs\n1690628 - CVE-2019-3875 keycloak: missing signatures validation on CRL used to verify client certificates\n1728609 - CVE-2019-10201 keycloak: SAML broker does not check existence of signature on document allowing any user impersonation\n1729261 - CVE-2019-10199 keycloak: CSRF check missing in My Resources functionality in the Account Console\n1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth\n1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth\n1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth\n1738673 - CVE-2019-10219 hibernate-validator: safeHTML validator allows XSS\n1741860 - CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service\n1749487 - CVE-2019-14832 keycloak: cross-realm user access auth bypass\n1751227 - CVE-2019-14838 wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default\n1755831 - CVE-2019-16335 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource\n1755849 - CVE-2019-14540 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig\n1758167 - CVE-2019-17267 jackson-databind: Serialization gadgets in classes of the ehcache package\n1758171 - CVE-2019-14892 jackson-databind: Serialization gadgets in classes of the commons-configuration package\n1758182 - CVE-2019-14893 jackson-databind: Serialization gadgets in classes of the xalan package\n1758187 - CVE-2019-16942 jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*\n1758191 - CVE-2019-16943 jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource\n1764607 - CVE-2019-0210 thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol\n1764612 - CVE-2019-0205 thrift: Endless loop when feed with specific input data\n1764658 - CVE-2019-12400 xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source\n1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default\n1772008 - CVE-2019-14887 wildfly: The \u0027enabled-protocols\u0027 value in legacy security is not respected if OpenSSL security provider is in use\n1772464 - CVE-2019-14888 undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS\n1775293 - CVE-2019-17531 jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*\n1793154 - CVE-2019-20330 jackson-databind: lacks certain net.sf.ehcache blocking\n1796225 - CVE-2020-7238 netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling\n1802444 - CVE-2020-1729 SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader\n1815470 - CVE-2020-10673 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution\n1815495 - CVE-2020-10672 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution\n1816170 - CVE-2019-12406 cxf: does not restrict the number of message attachments\n1816175 - CVE-2019-12419 cxf: OpenId Connect token service does not properly validate the clientId\n1816330 - CVE-2020-8840 jackson-databind: Lacks certain xbean-reflect/JNDI blocking\n1816332 - CVE-2020-9546 jackson-databind: Serialization gadgets in shaded-hikari-config\n1816337 - CVE-2020-9547 jackson-databind: Serialization gadgets in ibatis-sqlmap\n1816340 - CVE-2020-9548 jackson-databind: Serialization gadgets in anteros-core\n1819208 - CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider\n1819212 - CVE-2020-10969 jackson-databind: Serialization gadgets in javax.swing.JEditorPane\n1821304 - CVE-2020-11111 jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory\n1821311 - CVE-2020-11112 jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider\n1821315 - CVE-2020-11113 jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime\n1826798 - CVE-2020-11620 jackson-databind: Serialization gadgets in commons-jelly:commons-jelly\n1826805 - CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop\n\n5. Description:\n\nThe Container Network Interface (CNI) project consists of a specification\nand libraries for writing plug-ins for configuring network interfaces in\nLinux containers, along with a number of supported plug-ins. CNI concerns\nitself only with network connectivity of containers and removing allocated\nresources when the container is deleted. \n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). \n\nThe JBoss server process must be restarted for the update to take effect. JIRA issues fixed (https://issues.jboss.org/):\n\nKEYCLOAK-11792 - keycloak-spring-boot-2-adapter is missing from Red Hat maven and incremental client adapter zip\n\n6. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update\nAdvisory ID: RHSA-2019:4019-01\nProduct: Red Hat JBoss Enterprise Application Platform\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:4019\nIssue date: 2019-11-26\nCVE Names: CVE-2019-9511 CVE-2019-9512 CVE-2019-9514\n CVE-2019-9515 CVE-2019-14838 CVE-2019-14843\n====================================================================\n1. Summary:\n\nAn update is now available for Red Hat JBoss Enterprise Application\nPlatform 7.2 for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat JBoss EAP 7.2 for RHEL 7 Server - noarch, x86_64\n\n3. Description:\n\nRed Hat JBoss Enterprise Application Platform 7 is a platform for Java\napplications based on the WildFly application runtime. \n\nThis release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves\nas a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4,\nand includes bug fixes and enhancements. See the Red Hat JBoss Enterprise\nApplication Platform 7.2.5 Release Notes for information about the most\nsignificant bug fixes and enhancements included in this release. \n\nSecurity Fix(es):\n\n* undertow: HTTP/2: large amount of data requests leads to denial of\nservice (CVE-2019-9511)\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory\ngrowth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory\ngrowth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory\ngrowth (CVE-2019-9515)\n\n* wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and\n\u0027Deployer\u0027 user by default (CVE-2019-14838)\n\n* wildfly: wildfly-security-manager: security manager authorization bypass\n(CVE-2019-14843)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nBefore applying this update, back up your existing Red Hat JBoss Enterprise\nApplication Platform installation and deployed applications. \n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth\n1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth\n1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth\n1741860 - CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service\n1751227 - CVE-2019-14838 wildfly-core: Incorrect privileges for \u0027Monitor\u0027, \u0027Auditor\u0027 and \u0027Deployer\u0027 user by default\n1752980 - CVE-2019-14843 wildfly-security-manager: security manager authorization bypass\n\n6. JIRA issues fixed (https://issues.jboss.org/):\n\nJBEAP-17075 - (7.2.z) Upgrade yasson from 1.0.2.redhat-00001 to 1.0.5\nJBEAP-17220 - (7.2.x) HHH-13504 Upgrade ByteBuddy to 1.9.11\nJBEAP-17365 - [GSS](7.2.z) Upgrade RESTEasy from 3.6.1.SP6 to 3.6.1.SP7\nJBEAP-17476 - [GSS](7.2.z) Upgrade Generic JMS RA 2.0.2.Final\nJBEAP-17478 - [GSS](7.2.z) Upgrade JBoss Remoting from 5.0.14.SP1 to 5.0.16.Final\nJBEAP-17483 - [GSS](7.2.z) Upgrade Apache CXF from 3.2.9 to 3.2.10\nJBEAP-17495 - (7.2.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00007 to 2.5.5.SP12-redhat-00009\nJBEAP-17496 - (7.2.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00007 to 2.5.5.SP12-redhat-00009\nJBEAP-17513 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.11.SP1 to 5.3.13\nJBEAP-17521 - (7.2.z) Upgrade picketbox from 5.0.3.Final-redhat-00004 to 5.0.3.Final-redhat-00005\nJBEAP-17523 - [GSS](7.2.z) Upgrade wildfly-core from 6.0.16 to 6.0.17\nJBEAP-17547 - [GSS](7.2.z) Upgrade Elytron-Tool from 1.4.3 to 1.4.4.Final\nJBEAP-17548 - [GSS](7.2.z) Upgrade Elytron from 1.6.4.Final-redhat-00001 to 1.6.5.Final-redhat-00001\nJBEAP-17560 - [GSS](7.2.z) Upgrade HAL from 3.0.16 to 3.0.17\nJBEAP-17579 - [GSS](7.2.z) Upgrade JBoss MSC from 1.4.8 to 1.4.11\nJBEAP-17582 - [GSS](7.2.z) Upgrade JSF based on Mojarra 2.3.5.SP3-redhat-00002 to 2.3.5.SP3-redhat-00003\nJBEAP-17604 - Tracker bug for the EAP 7.2.5 release for RHEL-7\nJBEAP-17631 - [GSS](7.2.z) Upgrade Undertow from 2.0.25.SP1 to 2.0.26.SP3\nJBEAP-17647 - [GSS](7.2.z) Upgrade IronJacamar from 1.4.17.Final to 1.4.18.Final\nJBEAP-17665 - [GSS](7.2.z) Upgrade XNIO from 3.7.3.Final-redhat-00001 to 3.7.6.Final\nJBEAP-17722 - [GSS](7.2.z) Upgrade wildfly-http-client from 1.0.15.Final-redhat-00001 to 1.0.17.Final\nJBEAP-17874 - (7.2.z) Upgrade to wildfly-openssl 1.0.8\nJBEAP-17880 - (7.2.z) Upgrade XNIO from 3.7.6.Final-redhat-00001 to 3.7.6.SP1\n\n7. Package List:\n\nRed Hat JBoss EAP 7.2 for RHEL 7 Server:\n\nSource:\neap7-apache-cxf-3.2.10-1.redhat_00001.1.el7eap.src.rpm\neap7-byte-buddy-1.9.11-1.redhat_00002.1.el7eap.src.rpm\neap7-glassfish-jsf-2.3.5-5.SP3_redhat_00003.1.el7eap.src.rpm\neap7-hal-console-3.0.17-2.Final_redhat_00001.1.el7eap.src.rpm\neap7-hibernate-5.3.13-1.Final_redhat_00001.1.el7eap.src.rpm\neap7-ironjacamar-1.4.18-1.Final_redhat_00001.1.el7eap.src.rpm\neap7-jboss-genericjms-2.0.2-1.Final_redhat_00001.1.el7eap.src.rpm\neap7-jboss-msc-1.4.11-1.Final_redhat_00001.1.el7eap.src.rpm\neap7-jboss-remoting-5.0.16-2.Final_redhat_00001.1.el7eap.src.rpm\neap7-jboss-server-migration-1.3.1-6.Final_redhat_00006.1.el7eap.src.rpm\neap7-jboss-xnio-base-3.7.6-2.SP1_redhat_00001.1.el7eap.src.rpm\neap7-picketbox-5.0.3-6.Final_redhat_00005.1.el7eap.src.rpm\neap7-picketlink-bindings-2.5.5-20.SP12_redhat_00009.1.el7eap.src.rpm\neap7-picketlink-federation-2.5.5-20.SP12_redhat_00009.1.el7eap.src.rpm\neap7-resteasy-3.6.1-7.SP7_redhat_00001.1.el7eap.src.rpm\neap7-undertow-2.0.26-2.SP3_redhat_00001.1.el7eap.src.rpm\neap7-wildfly-7.2.5-4.GA_redhat_00002.1.el7eap.src.rpm\neap7-wildfly-elytron-1.6.5-1.Final_redhat_00001.1.el7eap.src.rpm\neap7-wildfly-elytron-tool-1.4.4-1.Final_redhat_00001.1.el7eap.src.rpm\neap7-wildfly-http-client-1.0.17-1.Final_redhat_00001.1.el7eap.src.rpm\neap7-wildfly-openssl-1.0.8-1.Final_redhat_00001.1.el7eap.src.rpm\neap7-wildfly-openssl-linux-x86_64-1.0.8-5.Final_redhat_00001.1.el7eap.src.rpm\neap7-yasson-1.0.5-1.redhat_00001.1.el7eap.src.rpm\n\nnoarch:\neap7-apache-cxf-3.2.10-1.redhat_00001.1.el7eap.noarch.rpm\neap7-apache-cxf-rt-3.2.10-1.redhat_00001.1.el7eap.noarch.rpm\neap7-apache-cxf-services-3.2.10-1.redhat_00001.1.el7eap.noarch.rpm\neap7-apache-cxf-tools-3.2.10-1.redhat_00001.1.el7eap.noarch.rpm\neap7-byte-buddy-1.9.11-1.redhat_00002.1.el7eap.noarch.rpm\neap7-glassfish-jsf-2.3.5-5.SP3_redhat_00003.1.el7eap.noarch.rpm\neap7-hal-console-3.0.17-2.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-hibernate-5.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-hibernate-core-5.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-hibernate-entitymanager-5.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-hibernate-envers-5.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-hibernate-java8-5.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-ironjacamar-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-ironjacamar-common-api-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-ironjacamar-common-impl-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-ironjacamar-common-spi-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-ironjacamar-core-api-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-ironjacamar-core-impl-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-ironjacamar-deployers-common-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-ironjacamar-jdbc-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-ironjacamar-validator-1.4.18-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-jboss-genericjms-2.0.2-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-jboss-msc-1.4.11-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-jboss-remoting-5.0.16-2.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-jboss-server-migration-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-cli-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-core-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-eap6.4-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-eap6.4-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-eap7.0-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-eap7.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-eap7.1-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-eap7.1-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly10.0-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly10.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly10.1-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly10.1-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly11.0-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly11.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly12.0-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly12.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly13.0-server-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly14.0-server-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly8.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly8.2-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly9.0-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-server-migration-wildfly9.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el7eap.noarch.rpm\neap7-jboss-xnio-base-3.7.6-2.SP1_redhat_00001.1.el7eap.noarch.rpm\neap7-picketbox-5.0.3-6.Final_redhat_00005.1.el7eap.noarch.rpm\neap7-picketbox-infinispan-5.0.3-6.Final_redhat_00005.1.el7eap.noarch.rpm\neap7-picketlink-api-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm\neap7-picketlink-bindings-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm\neap7-picketlink-common-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm\neap7-picketlink-config-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm\neap7-picketlink-federation-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm\neap7-picketlink-idm-api-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm\neap7-picketlink-idm-impl-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm\neap7-picketlink-idm-simple-schema-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm\neap7-picketlink-impl-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm\neap7-picketlink-wildfly8-2.5.5-20.SP12_redhat_00009.1.el7eap.noarch.rpm\neap7-resteasy-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-atom-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-cdi-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-client-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-client-microprofile-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-crypto-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-jackson-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-jackson2-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-jaxb-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-jaxrs-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-jettison-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-jose-jwt-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-jsapi-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-json-binding-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-json-p-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-multipart-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-rxjava2-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-spring-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-validator-provider-11-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-resteasy-yaml-provider-3.6.1-7.SP7_redhat_00001.1.el7eap.noarch.rpm\neap7-undertow-2.0.26-2.SP3_redhat_00001.1.el7eap.noarch.rpm\neap7-wildfly-7.2.5-4.GA_redhat_00002.1.el7eap.noarch.rpm\neap7-wildfly-elytron-1.6.5-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-wildfly-elytron-tool-1.4.4-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-wildfly-http-client-common-1.0.17-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-wildfly-http-ejb-client-1.0.17-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-wildfly-http-naming-client-1.0.17-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-wildfly-http-transaction-client-1.0.17-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-wildfly-java-jdk11-7.2.5-4.GA_redhat_00002.1.el7eap.noarch.rpm\neap7-wildfly-java-jdk8-7.2.5-4.GA_redhat_00002.1.el7eap.noarch.rpm\neap7-wildfly-javadocs-7.2.5-4.GA_redhat_00002.1.el7eap.noarch.rpm\neap7-wildfly-modules-7.2.5-4.GA_redhat_00002.1.el7eap.noarch.rpm\neap7-wildfly-openssl-1.0.8-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-wildfly-openssl-java-1.0.8-1.Final_redhat_00001.1.el7eap.noarch.rpm\neap7-yasson-1.0.5-1.redhat_00001.1.el7eap.noarch.rpm\n\nx86_64:\neap7-wildfly-openssl-linux-x86_64-1.0.8-5.Final_redhat_00001.1.el7eap.x86_64.rpm\neap7-wildfly-openssl-linux-x86_64-debuginfo-1.0.8-5.Final_redhat_00001.1.el7eap.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n8. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-9511\nhttps://access.redhat.com/security/cve/CVE-2019-9512\nhttps://access.redhat.com/security/cve/CVE-2019-9514\nhttps://access.redhat.com/security/cve/CVE-2019-9515\nhttps://access.redhat.com/security/cve/CVE-2019-14838\nhttps://access.redhat.com/security/cve/CVE-2019-14843\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/\nhttps://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/\n\n9. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n4I3dv+TPBuU=aKfk\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nAMQ Broker is a high-performance messaging implementation based on ActiveMQ\nArtemis. It uses an asynchronous journal for fast message persistence, and\nsupports multiple languages, protocols, and platforms. For further information, refer to the release notes linked to\nin the References section. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Description:\n\nThe container-tools module contains tools for working with containers,\nnotably podman, buildah, skopeo, and runc. \n\nBug Fix(es):\n\n* avc: podman run --security-opt label=type:svirt_qemu_net_t (BZ#1764318)\n\n* backport json-file logging support to 1.4.2 (BZ#1770176)\n\n* Selinux won\u0027t allow SCTP inter pod communication (BZ#1774382)\n\n4. Summary:\n\nThis is a security update for JBoss EAP Continuous Delivery 18.0. Description:\n\nRed Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak\nproject, that provides authentication and standards-based single sign-on\ncapabilities for web and mobile applications. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. JIRA issues fixed (https://issues.jboss.org/):\n\nKEYCLOAK-11816 - Tracker bug for the RH-SSO 7.3.5 release for RHEL7\n\n7. \n\nInstallation instructions are available from the Fuse 7.6.0 product\ndocumentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1399546 - CVE-2015-9251 js-jquery: Cross-site scripting via cross-domain ajax requests\n1432858 - CVE-2017-5929 logback: Serialization vulnerability in SocketServer and ServerSocketReceiver\n1591854 - CVE-2017-16012 js-jquery: XSS in responses from cross-origin ajax requests\n1618573 - CVE-2018-11771 apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip\n1643043 - CVE-2018-15756 springframework: DoS Attack via Range Requests\n1693777 - CVE-2019-3888 undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed\n1703469 - CVE-2019-10174 infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods\n1709860 - CVE-2019-5427 c3p0: loading XML configuration leads to denial of service\n1713068 - CVE-2019-10184 undertow: Information leak in requests for directories without trailing slashes\n1725795 - CVE-2019-12814 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message", "sources": [ { "db": "NVD", "id": "CVE-2019-9512" }, { "db": "CERT/CC", "id": "VU#605641" }, { "db": "JVNDB", "id": "JVNDB-2019-008112" }, { "db": "VULHUB", "id": "VHN-160947" }, { "db": "PACKETSTORM", "id": "157741" }, { "db": "PACKETSTORM", "id": "156209" }, { "db": "PACKETSTORM", "id": "155480" }, { "db": "PACKETSTORM", "id": "155520" }, { "db": "PACKETSTORM", "id": "155484" }, { "db": "PACKETSTORM", "id": "157214" }, { "db": "PACKETSTORM", "id": "155704" }, { "db": "PACKETSTORM", "id": "158095" }, { "db": "PACKETSTORM", "id": "155518" }, { "db": "PACKETSTORM", "id": "156941" } ], "trust": 3.33 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-9512", "trust": 3.5 }, { "db": "CERT/CC", "id": "VU#605641", "trust": 3.3 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2019/08/20/1", "trust": 1.7 }, { "db": "MCAFEE", "id": "SB10296", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "156209", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU93696206", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU98433488", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-008112", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201908-925", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "155396", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "155705", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "158651", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "157741", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "155520", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "155484", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "157214", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "158095", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156941", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "156852", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "156628", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155352", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "154135", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155728", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4238", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4737", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4332", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4324", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1030", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2619", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4533", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0643", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1766", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3152", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1076", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0994", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3114", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3597.2", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0007", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4645", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4596", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4586", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0100", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4788", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2071", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4697", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4484", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1335", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1427", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4368", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4665", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0832", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.3597.3", "trust": 0.6 }, { "db": "NSFOCUS", "id": "43919", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022072128", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-19-346-01", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155024", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154430", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154888", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154444", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154396", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158650", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154525", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154222", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154475", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "155037", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154638", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154058", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154425", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-160947", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "155480", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "155704", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "155518", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#605641" }, { "db": "VULHUB", "id": "VHN-160947" }, { "db": "JVNDB", "id": "JVNDB-2019-008112" }, { "db": "PACKETSTORM", "id": "157741" }, { "db": "PACKETSTORM", "id": "156209" }, { "db": "PACKETSTORM", "id": "155480" }, { "db": "PACKETSTORM", "id": "155520" }, { "db": "PACKETSTORM", "id": "155484" }, { "db": "PACKETSTORM", "id": "157214" }, { "db": "PACKETSTORM", "id": "155704" }, { "db": "PACKETSTORM", "id": "158095" }, { "db": "PACKETSTORM", "id": "155518" }, { "db": "PACKETSTORM", "id": "156941" }, { "db": "CNNVD", "id": "CNNVD-201908-925" }, { "db": "NVD", "id": "CVE-2019-9512" } ] }, "id": "VAR-201908-0422", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-160947" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:58:10.670000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DSA-4503", "trust": 0.8, "url": "https://www.debian.org/security/2019/dsa-4503" }, { "title": "SwiftNIO", "trust": 0.8, "url": "https://github.com/apple/swift-nio" }, { "title": "[ANNOUNCE] Apache Traffic Server is vulnerable to various HTTP/2 attacks (3921083)", "trust": 0.8, "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3cusers.trafficserver.apache.org%3e" }, { "title": "[ANNOUNCE] Apache Traffic Server is vulnerable to various HTTP/2 attacks (ad3d01e)", "trust": 0.8, "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3cannounce.trafficserver.apache.org%3e" }, { "title": "[ANNOUNCE] Apache Traffic Server is vulnerable to various HTTP/2 attacks (bde5230)", "trust": 0.8, "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3cdev.trafficserver.apache.org%3e" }, { "title": "HTTP/2 Remedial measures to achieve security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=96610" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-008112" }, { "db": "CNNVD", "id": "CNNVD-201908-925" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-160947" }, { "db": "JVNDB", "id": "JVNDB-2019-008112" }, { "db": "NVD", "id": "CVE-2019-9512" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://www.debian.org/security/2019/dsa-4503" }, { "trust": 2.5, "url": "https://github.com/netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "trust": 2.5, "url": "https://www.synology.com/security/advisory/synology_sa_19_33" }, { "trust": 2.5, "url": "https://seclists.org/bugtraq/2019/aug/24" }, { "trust": 2.5, "url": "https://kb.cert.org/vuls/id/605641/" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4019" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4021" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4041" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4045" }, { "trust": 2.4, "url": "https://access.redhat.com/errata/rhsa-2019:4269" }, { "trust": 2.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9512" }, { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2019:3892" }, { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2019:4018" }, { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2019:4020" }, { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2019:4040" }, { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2019:4042" }, { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2019:4273" }, { "trust": 2.3, "url": "https://access.redhat.com/errata/rhsa-2019:4352" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2020:0406" }, { "trust": 1.7, "url": "https://seclists.org/bugtraq/2019/aug/31" }, { "trust": 1.7, "url": "https://seclists.org/bugtraq/2019/aug/43" }, { "trust": 1.7, "url": "https://seclists.org/bugtraq/2019/sep/18" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "trust": 1.7, "url": "https://support.f5.com/csp/article/k98053339" }, { "trust": 1.7, "url": "https://www.debian.org/security/2019/dsa-4508" }, { "trust": 1.7, "url": "https://www.debian.org/security/2019/dsa-4520" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2019/aug/16" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" }, { "trust": 1.7, "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2594" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2661" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2682" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2690" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2726" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2766" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2769" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2796" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2861" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2925" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2939" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2955" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:2966" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:3131" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:3245" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:3265" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2019:3906" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2020:0727" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/4308-1/" }, { "trust": 1.6, "url": "https://blogs.akamai.com/sitr/2019/08/http2-vulnerabilities.html" }, { "trust": 1.6, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10296" }, { "trust": 1.4, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9512" }, { "trust": 1.0, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 1.0, "url": "https://bugzilla.redhat.com/):" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9514" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2019-9514" }, { "trust": 1.0, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2019-9512" }, { "trust": 1.0, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3cusers.trafficserver.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3cannounce.trafficserver.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3cdev.trafficserver.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4bbp27pzgsy6op6d26e5fw4gzkbfhnu7/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4zqghe3wtylyayjeidjvf2figqtaypmc/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/cmnfx5mnyrwwimo4btkyqcgudmho3axp/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/lyo6e3h34c346d2e443glxk7ok6kiyiq/" }, { "trust": 1.0, "url": "https://support.f5.com/csp/article/k98053339?utm_source=f5support\u0026amp%3butm_medium=rss" }, { "trust": 0.8, "url": "https://vuls.cert.org/confluence/pages/viewpage.action?pageid=56393752" }, { "trust": 0.8, "url": "https://tools.ietf.org/html/rfc7540" }, { "trust": 0.8, "url": "https://tools.ietf.org/html/rfc7541" }, { "trust": 0.8, "url": "https://blog.cloudflare.com/on-the-recent-http-2-dos-attacks/" }, { "trust": 0.8, "url": "https://blog.litespeedtech.com/2019/08/15/litespeed-addresses-http-2-dos-advisories/" }, { "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9511https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9512https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9513https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9514https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9518" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98433488/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93696206/" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2019-9515" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/lyo6e3h34c346d2e443glxk7ok6kiyiq/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/cmnfx5mnyrwwimo4btkyqcgudmho3axp/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4bbp27pzgsy6op6d26e5fw4gzkbfhnu7/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4zqghe3wtylyayjeidjvf2figqtaypmc/" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3cannounce.trafficserver.apache.org%3e" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3cdev.trafficserver.apache.org%3e" }, { "trust": 0.7, "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3cusers.trafficserver.apache.org%3e" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9515" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14838" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2019-14838" }, { "trust": 0.6, "url": "http2-cves/" }, { "trust": 0.6, "url": "https://www.cloudfoundry.org/blog/various-" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9518" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9517" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9516" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9515" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9514" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9513" }, { "trust": 0.6, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9511" }, { "trust": 0.6, "url": "https://support.f5.com/csp/article/k98053339?utm_source=f5support\u0026utm_medium=rss" }, { "trust": 0.6, "url": "https://support.apple.com/en-au/ht210436" }, { "trust": 0.6, "url": "https://support.f5.com/csp/article/k50233772" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1126605" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914246-1.html" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1104951" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2019:3905" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-346-01" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1109787" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1109781" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1108515" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1109775" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1165894" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1165906" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1135167" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1164346" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1164364" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200059-1.html" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1128387" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/157214/red-hat-security-advisory-2020-1445-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4368/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4788/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4586/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0994/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-node-js-affect-ibm-spectrum-protect-plus-cve-2019-15606-cve-2019-15604-cve-2019-15605-cve-2019-9511-cve-2019-9516-cve-2019-9512-cve-2019-9517-cve-2019-951/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4332/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0643/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4484/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-have-been-identified-in-db2-that-affect-the-ibm-performance-management-product/" }, { "trust": 0.6, "url": "http2-implementation-vulnerablility/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-websphere-liberty-susceptible-to-" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155728/red-hat-security-advisory-2019-4352-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2619/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3114/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-kubernetes-affect-ibm-infosphere-information-server/" }, { "trust": 0.6, "url": "https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/cve-2019-9512" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-websphere-application-server-liberty-affect-ibm-spectrum-protect-operations-center-and-client-management-service/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1335/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/157741/red-hat-security-advisory-2020-2067-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156209/red-hat-security-advisory-2020-0406-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3597.3/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/158095/red-hat-security-advisory-2020-2565-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4737/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0832/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1137466" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/43919" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/http-2-multiple-vulnerabilities-30040" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155484/red-hat-security-advisory-2019-4019-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-netty-affect-ibm-operations-analytics-predictive-insights-cve-2019-9514-cve-2019-9512-cve-2019-9518-cve-2019-9515/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1076/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156628/red-hat-security-advisory-2020-0727-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation-3/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2071/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1127397" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1427/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4645/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3597.2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4665/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-ibm-cloud-pak-for-data-affected-by-vulnerability-in-netty/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-netty-affect-ibm-netcool-agile-service-manager/" }, { "trust": 0.6, "url": "https://pivotal.io/security/cve-2019-9517" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4697/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-warehouse-has-released-a-fix-in-response-to-multiple-vulnerabilities-found-in-ibm-db2/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-transformation-advisor-is-affected-by-vulnerabilities-in-websphere-application-server-liberty-cve-2019-9515-cve-2019-9518-cve-2019-9517-cve-2019-9512-cve-2019-9514-c/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4596/" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht210436" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155520/red-hat-security-advisory-2019-4045-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-db2-and-ibm-java-runtime-affect-ibm-spectrum-protect-server/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-in-ibm-websphere-application-server-affect-ibm-sterling-b2b-integrator/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1128279" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156852/red-hat-security-advisory-2020-0922-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156941/red-hat-security-advisory-2020-0983-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1766/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/154135/debian-security-advisory-4503-1.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022072128" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3152/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation-2/" }, { "trust": 0.6, "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-infosphere-information-server-is-affected-by-multiple-vulnerabilities-in-websphere-application-server-liberty/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/158651/red-hat-security-advisory-2020-3197-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4324/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4533/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1150960" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155396/red-hat-security-advisory-2019-3906-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0100/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155705/red-hat-security-advisory-2019-4273-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0007/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4238/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155352/red-hat-security-advisory-2019-3892-01.html" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1165852" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1030/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1127853" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1168528" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9511" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2019-9511" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://issues.jboss.org/):" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14843" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2019-14843" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11619" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-7238" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11620" }, { "trust": 0.2, "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/" }, { "trust": 0.2, "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/" }, { "trust": 0.2, "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.3/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-14837" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14837" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9517" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-9517" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-9516" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-9518" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9516" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9518" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10296" }, { "trust": 0.1, "url": "https://support.f5.com/csp/article/k98053339?utm_source=f5support\u0026amp;amp;utm_medium=rss" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-16335" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-11112" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-3875" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-11113" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-10968" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14832" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9546" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-16943" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-10672" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10201" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_build_of_thorntail/2.5/html/release_notes_for_thorntail_2.5/" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:2067" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3875" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20330" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12406" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12400" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0210" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0205" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20330" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12419" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-10673" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17531" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16335" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-0210" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10086" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10219" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17531" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14540" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17267" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10199" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=catrhoar.thorntail\u0026version=2.5.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16942" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12406" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14887" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14892" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10201" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9548" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-1729" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16943" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-10969" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12419" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17267" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-0205" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14893" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-11111" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10199" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-9547" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-16942" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14893" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14888" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12400" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14892" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10219" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10086" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14887" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14540" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14820" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8840" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14820" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14888" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform\u0026downloadtype=securitypatches\u0026version=7.2" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=core.service.rhsso\u0026downloadtype=securitypatches\u0026version=7.3" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-0222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10247" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20445" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20444" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-16869" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-7238" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:1445" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10241" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10247" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16869" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10241" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20445" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16884" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-16884" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11620" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:2565" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11619" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19343" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-3805" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-19343" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3805" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9513" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10174" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-9251" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10184" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14379" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11771" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5427" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12422" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-3888" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5929" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12422" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11272" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-17570" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3888" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-9513" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17570" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=jboss.fuse\u0026version=7.6.0" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-5929" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-11771" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14439" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3802" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-10184" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12384" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-15756" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-5427" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15756" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-9251" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-16012" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-10174" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12384" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-11272" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-3802" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-12814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16012" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:0983" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-14379" } ], "sources": [ { "db": "CERT/CC", "id": "VU#605641" }, { "db": "VULHUB", "id": "VHN-160947" }, { "db": "JVNDB", "id": "JVNDB-2019-008112" }, { "db": "PACKETSTORM", "id": "157741" }, { "db": "PACKETSTORM", "id": "156209" }, { "db": "PACKETSTORM", "id": "155480" }, { "db": "PACKETSTORM", "id": "155520" }, { "db": "PACKETSTORM", "id": "155484" }, { "db": "PACKETSTORM", "id": "157214" }, { "db": "PACKETSTORM", "id": "155704" }, { "db": "PACKETSTORM", "id": "158095" }, { "db": "PACKETSTORM", "id": "155518" }, { "db": "PACKETSTORM", "id": "156941" }, { "db": "CNNVD", "id": "CNNVD-201908-925" }, { "db": "NVD", "id": "CVE-2019-9512" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#605641" }, { "db": "VULHUB", "id": "VHN-160947" }, { "db": "JVNDB", "id": "JVNDB-2019-008112" }, { "db": "PACKETSTORM", "id": "157741" }, { "db": "PACKETSTORM", "id": "156209" }, { "db": "PACKETSTORM", "id": "155480" }, { "db": "PACKETSTORM", "id": "155520" }, { "db": "PACKETSTORM", "id": "155484" }, { "db": "PACKETSTORM", "id": "157214" }, { "db": "PACKETSTORM", "id": "155704" }, { "db": "PACKETSTORM", "id": "158095" }, { "db": "PACKETSTORM", "id": "155518" }, { "db": "PACKETSTORM", "id": "156941" }, { "db": "CNNVD", "id": "CNNVD-201908-925" }, { "db": "NVD", "id": "CVE-2019-9512" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-13T00:00:00", "db": "CERT/CC", "id": "VU#605641" }, { "date": "2019-08-13T00:00:00", "db": "VULHUB", "id": "VHN-160947" }, { "date": "2019-08-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-008112" }, { "date": "2020-05-18T16:42:53", "db": "PACKETSTORM", "id": "157741" }, { "date": "2020-02-05T18:34:34", "db": "PACKETSTORM", "id": "156209" }, { "date": "2019-11-27T15:38:24", "db": "PACKETSTORM", "id": "155480" }, { "date": "2019-12-02T19:20:27", "db": "PACKETSTORM", "id": "155520" }, { "date": "2019-11-27T15:43:14", "db": "PACKETSTORM", "id": "155484" }, { "date": "2020-04-14T15:39:41", "db": "PACKETSTORM", "id": "157214" }, { "date": "2019-12-17T15:42:47", "db": "PACKETSTORM", "id": "155704" }, { "date": "2020-06-16T00:54:44", "db": "PACKETSTORM", "id": "158095" }, { "date": "2019-12-02T19:20:11", "db": "PACKETSTORM", "id": "155518" }, { "date": "2020-03-27T13:16:40", "db": "PACKETSTORM", "id": "156941" }, { "date": "2019-08-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201908-925" }, { "date": "2019-08-13T21:15:12.287000", "db": "NVD", "id": "CVE-2019-9512" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-19T00:00:00", "db": "CERT/CC", "id": "VU#605641" }, { "date": "2019-08-23T00:00:00", "db": "VULHUB", "id": "VHN-160947" }, { "date": "2019-08-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-008112" }, { "date": "2022-07-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201908-925" }, { "date": "2023-11-07T03:13:41.880000", "db": "NVD", "id": "CVE-2019-9512" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201908-925" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion", "sources": [ { "db": "CERT/CC", "id": "VU#605641" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201908-925" } ], "trust": 0.6 } }
gsd-2019-9512
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-9512", "description": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "id": "GSD-2019-9512", "references": [ "https://www.suse.com/security/cve/CVE-2019-9512.html", "https://www.debian.org/security/2019/dsa-4520", "https://www.debian.org/security/2019/dsa-4508", "https://www.debian.org/security/2019/dsa-4503", "https://access.redhat.com/errata/RHSA-2020:3197", "https://access.redhat.com/errata/RHSA-2020:3196", "https://access.redhat.com/errata/RHSA-2020:2565", "https://access.redhat.com/errata/RHSA-2020:2067", "https://access.redhat.com/errata/RHSA-2020:1445", "https://access.redhat.com/errata/RHSA-2020:0983", "https://access.redhat.com/errata/RHSA-2020:0922", "https://access.redhat.com/errata/RHSA-2020:0727", "https://access.redhat.com/errata/RHSA-2020:0406", "https://access.redhat.com/errata/RHSA-2019:4352", "https://access.redhat.com/errata/RHSA-2019:4273", "https://access.redhat.com/errata/RHSA-2019:4269", "https://access.redhat.com/errata/RHSA-2019:4045", "https://access.redhat.com/errata/RHSA-2019:4042", "https://access.redhat.com/errata/RHSA-2019:4041", "https://access.redhat.com/errata/RHSA-2019:4040", "https://access.redhat.com/errata/RHSA-2019:4021", "https://access.redhat.com/errata/RHSA-2019:4020", "https://access.redhat.com/errata/RHSA-2019:4019", "https://access.redhat.com/errata/RHSA-2019:4018", "https://access.redhat.com/errata/RHSA-2019:3906", "https://access.redhat.com/errata/RHSA-2019:3892", "https://access.redhat.com/errata/RHSA-2019:3265", "https://access.redhat.com/errata/RHSA-2019:3245", "https://access.redhat.com/errata/RHBA-2019:3139", "https://access.redhat.com/errata/RHSA-2019:3131", "https://access.redhat.com/errata/RHSA-2019:2966", "https://access.redhat.com/errata/RHSA-2019:2955", "https://access.redhat.com/errata/RHSA-2019:2939", "https://access.redhat.com/errata/RHSA-2019:2925", "https://access.redhat.com/errata/RHSA-2019:2861", "https://access.redhat.com/errata/RHSA-2019:2817", "https://access.redhat.com/errata/RHSA-2019:2796", "https://access.redhat.com/errata/RHSA-2019:2769", "https://access.redhat.com/errata/RHSA-2019:2766", "https://access.redhat.com/errata/RHSA-2019:2726", "https://access.redhat.com/errata/RHSA-2019:2690", "https://access.redhat.com/errata/RHSA-2019:2682", "https://access.redhat.com/errata/RHSA-2019:2661", "https://access.redhat.com/errata/RHSA-2019:2594", "https://ubuntu.com/security/CVE-2019-9512", "https://advisories.mageia.org/CVE-2019-9512.html", "https://security.archlinux.org/CVE-2019-9512", "https://alas.aws.amazon.com/cve/html/CVE-2019-9512.html", "https://linux.oracle.com/cve/CVE-2019-9512.html", "https://access.redhat.com/errata/RHBA-2019:2819" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-9512" ], "details": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "id": "GSD-2019-9512", "modified": "2023-12-13T01:23:47.269763Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "AKA": "HTTP/2 Ping Flood", "ASSIGNER": "cert@cert.org", "ID": "CVE-2019-9512", "STATE": "PUBLIC", "TITLE": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Jonathan Looney of Netflix for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "name": "DSA-4503", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4503" }, { "name": "https://support.f5.com/csp/article/K98053339", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K98053339" }, { "name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "openSUSE-SU-2019:2000", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "20190825 [SECURITY] [DSA 4508-1] h2o security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "name": "DSA-4508", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4508" }, { "name": "openSUSE-SU-2019:2056", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "name": "openSUSE-SU-2019:2072", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "name": "FEDORA-2019-55d101a740", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "name": "FEDORA-2019-65db7ad6c7", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "name": "openSUSE-SU-2019:2085", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "name": "RHSA-2019:2682", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "name": "DSA-4520", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "RHSA-2019:2726", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "RHSA-2019:2594", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "RHSA-2019:2661", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2690", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "name": "RHSA-2019:2766", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "name": "openSUSE-SU-2019:2130", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "name": "RHSA-2019:2796", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "name": "RHSA-2019:2861", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "RHSA-2019:2966", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "name": "https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3131", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "name": "RHSA-2019:2769", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "name": "RHSA-2019:3245", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "name": "RHSA-2019:3265", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "name": "RHSA-2019:3892", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "RHSA-2019:3906", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "name": "RHSA-2019:4018", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "name": "RHSA-2019:4019", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "name": "RHSA-2019:4021", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "name": "RHSA-2019:4020", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "name": "RHSA-2019:4045", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "name": "RHSA-2019:4042", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "name": "RHSA-2019:4040", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "name": "RHSA-2019:4041", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "name": "RHSA-2019:4269", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "name": "RHSA-2019:4273", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "name": "RHSA-2019:4352", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0406", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "name": "RHSA-2020:0727", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "USN-4308-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4308-1/" }, { "name": "[debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" } ] }, "source": { "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c0.0.0-20190813141303-74dc4d7220e7", "affected_versions": "All versions before 0.0.0-20190813141303-74dc4d7220e7", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-400", "CWE-937" ], "date": "2023-02-24", "description": "Some HTTP/2 implementations is vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "fixed_versions": [ "0.0.0-20190813141303-74dc4d7220e7" ], "identifier": "CVE-2019-9512", "identifiers": [ "GHSA-hgr8-6h9x-f7q9", "CVE-2019-9512" ], "not_impacted": "All versions starting from 0.0.0-20190813141303-74dc4d7220e7", "package_slug": "go/golang.org/x/net", "pubdate": "2022-05-24", "solution": "Upgrade to version 0.0.0-20190813141303-74dc4d7220e7 or above.", "title": "Uncontrolled Resource Consumption", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "https://go.dev/cl/190137", "https://go.dev/issue/33606", "https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5", "https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ", "https://pkg.go.dev/vuln/GO-2022-0536", "https://github.com/advisories/GHSA-hgr8-6h9x-f7q9" ], "uuid": "0dc2e380-3fb9-4c89-a888-28d22ea73486" }, { "affected_range": "\u003c0.0.0-20190813141303-74dc4d7220e7", "affected_versions": "All versions before 0.0.0-20190813141303-74dc4d7220e7", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-400", "CWE-937" ], "date": "2023-02-08", "description": "Some HTTP/2 implementations is vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "fixed_versions": [ "0.0.0-20190813141303-74dc4d7220e7" ], "identifier": "CVE-2019-9512", "identifiers": [ "GHSA-hgr8-6h9x-f7q9", "CVE-2019-9512" ], "not_impacted": "All versions starting from 0.0.0-20190813141303-74dc4d7220e7", "package_slug": "go/golang.org/x/net/http", "pubdate": "2022-05-24", "solution": "Upgrade to version 0.0.0-20190813141303-74dc4d7220e7 or above.", "title": "Uncontrolled Resource Consumption", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "https://access.redhat.com/errata/RHSA-2019:2594", "https://access.redhat.com/errata/RHSA-2019:2661", "https://access.redhat.com/errata/RHSA-2019:2682", "https://access.redhat.com/errata/RHSA-2019:2690", "https://access.redhat.com/errata/RHSA-2019:2726", "https://access.redhat.com/errata/RHSA-2019:2766", "https://access.redhat.com/errata/RHSA-2019:2769", "https://access.redhat.com/errata/RHSA-2019:2796", "https://access.redhat.com/errata/RHSA-2019:2861", "https://access.redhat.com/errata/RHSA-2019:2925", "https://access.redhat.com/errata/RHSA-2019:2939", "https://access.redhat.com/errata/RHSA-2019:2955", "https://access.redhat.com/errata/RHSA-2019:2966", "https://access.redhat.com/errata/RHSA-2019:3131", "https://access.redhat.com/errata/RHSA-2019:3245", "https://access.redhat.com/errata/RHSA-2019:3265", "https://access.redhat.com/errata/RHSA-2019:3892", "https://access.redhat.com/errata/RHSA-2019:3906", "https://access.redhat.com/errata/RHSA-2019:4018", "https://access.redhat.com/errata/RHSA-2019:4019", "https://access.redhat.com/errata/RHSA-2019:4020", "https://access.redhat.com/errata/RHSA-2019:4021", "https://access.redhat.com/errata/RHSA-2019:4040", "https://access.redhat.com/errata/RHSA-2019:4041", "https://access.redhat.com/errata/RHSA-2019:4042", "https://access.redhat.com/errata/RHSA-2019:4045", "https://access.redhat.com/errata/RHSA-2019:4269", "https://access.redhat.com/errata/RHSA-2019:4273", "https://access.redhat.com/errata/RHSA-2019:4352", "https://access.redhat.com/errata/RHSA-2020:0406", "https://access.redhat.com/errata/RHSA-2020:0727", "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "https://kb.cert.org/vuls/id/605641/", "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E", "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E", "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E", "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/", "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/", "https://seclists.org/bugtraq/2019/Aug/24", "https://seclists.org/bugtraq/2019/Aug/31", "https://seclists.org/bugtraq/2019/Aug/43", "https://seclists.org/bugtraq/2019/Sep/18", "https://security.netapp.com/advisory/ntap-20190823-0001/", "https://security.netapp.com/advisory/ntap-20190823-0004/", "https://security.netapp.com/advisory/ntap-20190823-0005/", "https://support.f5.com/csp/article/K98053339", "https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp;utm_medium=RSS", "https://usn.ubuntu.com/4308-1/", "https://www.debian.org/security/2019/dsa-4503", "https://www.debian.org/security/2019/dsa-4508", "https://www.debian.org/security/2019/dsa-4520", "https://www.synology.com/security/advisory/Synology_SA_19_33", "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html", "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html", "http://seclists.org/fulldisclosure/2019/Aug/16", "http://www.openwall.com/lists/oss-security/2019/08/20/1", "https://go.dev/cl/190137", "https://go.dev/issue/33606", "https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5", "https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ", "https://pkg.go.dev/vuln/GO-2022-0536", "https://github.com/advisories/GHSA-hgr8-6h9x-f7q9" ], "uuid": "e5a34ef1-1ce7-4b58-8089-7852a72e7910" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "14.04", "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "10.12", "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.3", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.6", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.3", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "8.8.1", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "10.12.0", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "12.8.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "10.16.3", "versionStartIncluding": "10.13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "8.16.1", "versionStartIncluding": "8.9.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2019-9512" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "[trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "name": "DSA-4503", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4503" }, { "name": "https://support.f5.com/csp/article/K98053339", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K98053339" }, { "name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0004/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0004/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0001/" }, { "name": "openSUSE-SU-2019:2000", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "20190825 [SECURITY] [DSA 4508-1] h2o security update", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "name": "DSA-4508", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4508" }, { "name": "openSUSE-SU-2019:2056", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "name": "openSUSE-SU-2019:2072", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "name": "FEDORA-2019-65db7ad6c7", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/" }, { "name": "FEDORA-2019-55d101a740", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/" }, { "name": "openSUSE-SU-2019:2085", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "name": "RHSA-2019:2682", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "name": "DSA-4520", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "RHSA-2019:2726", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "RHSA-2019:2594", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "RHSA-2019:2661", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2690", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "name": "RHSA-2019:2766", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "name": "openSUSE-SU-2019:2130", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "name": "RHSA-2019:2796", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "name": "RHSA-2019:2861", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "RHSA-2019:2966", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "name": "https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3131", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "name": "RHSA-2019:2769", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "name": "RHSA-2019:3245", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "name": "RHSA-2019:3265", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "name": "RHSA-2019:3892", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "RHSA-2019:3906", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "name": "RHSA-2019:4018", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "name": "RHSA-2019:4020", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "name": "RHSA-2019:4019", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "name": "RHSA-2019:4021", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "name": "RHSA-2019:4040", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "name": "RHSA-2019:4042", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "name": "RHSA-2019:4041", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "name": "RHSA-2019:4045", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "name": "RHSA-2019:4269", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "name": "RHSA-2019:4273", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "name": "RHSA-2019:4352", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0406", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "name": "RHSA-2020:0727", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "USN-4308-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4308-1/" }, { "name": "[debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-08-12T18:41Z", "publishedDate": "2019-08-13T21:15Z" } } }
ghsa-hgr8-6h9x-f7q9
Vulnerability from github
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Specific Go Packages Affected
golang.org/x/net/http2
{ "affected": [ { "package": { "ecosystem": "Go", "name": "golang.org/x/net" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20190813141303-74dc4d7220e7" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2019-9512" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": true, "github_reviewed_at": "2023-02-08T00:30:13Z", "nvd_published_at": "2019-08-13T21:15:00Z", "severity": "HIGH" }, "details": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.\n\n### Specific Go Packages Affected\ngolang.org/x/net/http2", "id": "GHSA-hgr8-6h9x-f7q9", "modified": "2024-05-20T21:30:32Z", "published": "2022-05-24T16:53:17Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "type": "WEB", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "type": "WEB", "url": "https://go.dev/cl/190137" }, { "type": "WEB", "url": "https://go.dev/issue/33606" }, { "type": "WEB", "url": "https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ" }, { "type": "WEB", "url": "https://kb.cert.org/vuls/id/605641" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2022-0536" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/31" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/43" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190823-0001" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190823-0004" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190823-0005" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K98053339" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K98053339?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4308-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4503" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4508" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4520" }, { "type": "WEB", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2594" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2661" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2682" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2690" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2726" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2766" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2769" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2796" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2861" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2966" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3131" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3245" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3265" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3906" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4018" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4019" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4020" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4021" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4040" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4041" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4042" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4045" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4269" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4273" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0406" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/08/20/1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "golang.org/x/net/http vulnerable to ping floods" }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.