Action not permitted
Modal body text goes here.
cve-2020-11080
Vulnerability from cvelistv5
Published
2020-06-03 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Denial of service in nghttp2
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4696", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4696" }, { "name": "openSUSE-SU-2020:0802", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" }, { "name": "FEDORA-2020-f7d15c8b77", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090" }, { "tags": [ "x_transferred" ], "url": "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "FEDORA-2020-43d5a372fc", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nghttp2", "vendor": "nghttp2", "versions": [ { "status": "affected", "version": "\u003c 1.41.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., \u003e 32), then drop the connection." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-707", "description": "CWE-707 Improper Enforcement of Message or Data Structure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T17:06:24.016570", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "DSA-4696", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2020/dsa-4696" }, { "name": "openSUSE-SU-2020:0802", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" }, { "name": "FEDORA-2020-f7d15c8b77", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/" }, { "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" }, { "url": "https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090" }, { "url": "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394" }, { "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "FEDORA-2020-43d5a372fc", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/" }, { "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html" }, { "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html" } ], "source": { "advisory": "GHSA-q5wr-xfw9-q7xr", "discovery": "UNKNOWN" }, "title": "Denial of service in nghttp2" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11080", "datePublished": "2020-06-03T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-11080\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2020-06-03T23:15:11.073\",\"lastModified\":\"2023-11-07T03:14:29.403\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., \u003e 32), then drop the connection.\"},{\"lang\":\"es\",\"value\":\"En nghttp2 versiones anteriores a 1.41.0, la carga \u00fatil de la trama HTTP/2 SETTINGS demasiado grande causa una denegaci\u00f3n de servicio. El ataque de prueba de concepto involucra a un cliente malicioso que construye una trama SETTINGS con una longitud de 14,400 bytes (2400 entradas de configuraciones individuales) una y otra vez. El ataque causa que la CPU se aumente al 100%. nghttp2 versi\u00f3n v1.41.0 corrige esta vulnerabilidad. Existe una soluci\u00f3n alternativa a esta vulnerabilidad. Implemente la funci\u00f3n nghttp2_on_frame_recv_callback callback, y si la trama es recibida es la trama SETTINGS y el n\u00famero de entradas de configuraci\u00f3n es grande (por ejemplo, mayor a 32), luego desconecte la conexi\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-707\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.41.0\",\"matchCriteriaId\":\"6B8F12EE-F729-4A29-A21C-254E2E13B649\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EABAFD73-150F-4DFE-B721-29EB4475D979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:banking_extensibility_workbench:14.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE57039D-E2EE-4014-A7B1-D7380D26098E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.1.2\",\"matchCriteriaId\":\"D0DBC938-A782-433F-8BF1-CA250C332AA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E11C65C3-1B17-4362-A99C-59583081A24D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"348EEE70-E114-4720-AAAF-E77DE5C9A2D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:19.3.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"909B4029-1D4F-4D60-AC6D-98C7E9FF1B15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.1.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"B501426C-7FB5-4C0D-83E4-0279746EFBE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.3.0\",\"versionEndIncluding\":\"7.3.30\",\"matchCriteriaId\":\"2D2F1144-F032-4687-8F76-1A4E45BCD8F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.4.0\",\"versionEndIncluding\":\"7.4.29\",\"matchCriteriaId\":\"BD5F19DF-F8E7-48B4-BBFA-22A0118584CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.5.0\",\"versionEndIncluding\":\"7.5.19\",\"matchCriteriaId\":\"FD7FA925-B9AC-4819-AAC1-C3478D80E3E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.6.0\",\"versionEndIncluding\":\"7.6.15\",\"matchCriteriaId\":\"DF828AB6-ED4E-4AA9-9E8D-58E715DBDB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.0.21\",\"matchCriteriaId\":\"7A885799-F19A-41B5-B015-B318ED959755\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.12.0\",\"matchCriteriaId\":\"25A3180B-21AF-4010-9DAB-41ADFD2D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"10.13.0\",\"versionEndExcluding\":\"10.21.0\",\"matchCriteriaId\":\"E9E9BD86-6374-45B3-8727-AACED7C8F3B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndIncluding\":\"12.12.0\",\"matchCriteriaId\":\"564ED5C8-50D7-413A-B88E-E62B6C07336A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"12.13.0\",\"versionEndExcluding\":\"12.18.0\",\"matchCriteriaId\":\"319C5BC0-7893-4FEC-8051-C8067F5007D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.4.0\",\"matchCriteriaId\":\"7AB132F1-11B6-4B70-8819-4ADD7B6C814E\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.debian.org/security/2020/dsa-4696\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com//security-alerts/cpujul2021.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2021.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2020_2852
Vulnerability from csaf_redhat
Published
2020-07-07 17:48
Modified
2024-11-15 08:33
Summary
Red Hat Security Advisory: nodejs:12 security update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.18.2).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.18.2).\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)\n\n* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2852", "url": "https://access.redhat.com/errata/RHSA-2020:2852" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2852.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security update", "tracking": { "current_release_date": "2024-11-15T08:33:23+00:00", "generator": { "date": "2024-11-15T08:33:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2852", "initial_release_date": "2020-07-07T17:48:05+00:00", "revision_history": [ { "date": "2020-07-07T17:48:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-07T17:48:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:33:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8020020200630155331:4cda2c84", "product": { "name": "nodejs:12:8020020200630155331:4cda2c84", "product_id": "nodejs:12:8020020200630155331:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8020020200630155331:4cda2c84" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "product": { "name": "nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "product_id": "nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "product": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "product_id": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.2.0%2B7233%2B61d664c1?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, "product_reference": "nodejs:12:8020020200630155331:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch" }, "product_reference": "nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64 as a component of nodejs:12:8020020200630155331:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1813344" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay only includes minimist as a dependency of the test suites, and it not include it in the product. We may fix this issue in a future Red Hat Quay release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "RHBZ#1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" } ], "release_date": "2020-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T17:48:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2852" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-8172", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845247" } ], "notes": [ { "category": "description", "text": "A TLS Hostname verification bypass vulnerability exists in NodeJS. This flaw allows an attacker to bypass TLS Hostname verification when a TLS client reuses HTTPS sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: TLS session reuse can lead to hostname verification bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects the TLS 1.2 protocol, not TLS 1.3. This issue does not affect NodeJS 10.\n\nRed Hat Quay installed NodeJS as a dependency of Yarn. It does not use NodeJS at runtime, but executes Javascript on the client\u0027s browser instead. Therefore the impact of this vulnerability on Red Hat Quay is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8172" }, { "category": "external", "summary": "RHBZ#1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8172", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T17:48:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2852" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: TLS session reuse can lead to hostname verification bypass" }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845256" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: memory corruption in napi_get_value_string_* functions", "title": "Vulnerability summary" }, { "category": "other", "text": "NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8174" }, { "category": "external", "summary": "RHBZ#1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8174", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174" }, { "category": "external", "summary": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T17:48:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2852" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: memory corruption in napi_get_value_string_* functions" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T17:48:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2852" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:12:8020020200630155331:4cda2c84:npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2848
Vulnerability from csaf_redhat
Published
2020-07-07 09:27
Modified
2024-11-15 08:32
Summary
Red Hat Security Advisory: nodejs:10 security update
Notes
Topic
An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.21.0).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (10.21.0).\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2848", "url": "https://access.redhat.com/errata/RHSA-2020:2848" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2848.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2024-11-15T08:32:54+00:00", "generator": { "date": "2024-11-15T08:32:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2848", "initial_release_date": "2020-07-07T09:27:40+00:00", "revision_history": [ { "date": "2020-07-07T09:27:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-07T09:27:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:32:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8020020200617141353:4cda2c84", "product": { "name": "nodejs:10:8020020200617141353:4cda2c84", "product_id": "nodejs:10:8020020200617141353:4cda2c84", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8020020200617141353:4cda2c84" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "product": { "name": "nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "product_id": "nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "product": { "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "product_id": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product": { "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product_id": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product_id": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product_id": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product": { "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product_id": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product_id": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64", "product": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64", "product_id": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.4-1.10.21.0.3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product": { "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product_id": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product_id": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product_id": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product": { "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product_id": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product_id": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "product": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "product_id": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.4-1.10.21.0.3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product": { "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_id": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_id": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_id": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product": { "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_id": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_id": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "product": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_id": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.4-1.10.21.0.3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product": { "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product_id": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product_id": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product_id": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product": { "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product_id": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product_id": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.21.0-3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "product": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "product_id": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.4-1.10.21.0.3.module%2Bel8.2.0%2B7071%2Bd2377ea3?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, "product_reference": "nodejs:10:8020020200617141353:4cda2c84", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x" }, "product_reference": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64" }, "product_reference": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x" }, "product_reference": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64" }, "product_reference": "nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64" }, "product_reference": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le" }, "product_reference": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x" }, "product_reference": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64" }, "product_reference": "nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch" }, "product_reference": "nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64" }, "product_reference": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le" }, "product_reference": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x" }, "product_reference": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64" }, "product_reference": "nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64" }, "product_reference": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le" }, "product_reference": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x" }, "product_reference": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64 as a component of nodejs:10:8020020200617141353:4cda2c84 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64" }, "product_reference": "npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1813344" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay only includes minimist as a dependency of the test suites, and it not include it in the product. We may fix this issue in a future Red Hat Quay release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "RHBZ#1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" } ], "release_date": "2020-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:27:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2848" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845256" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: memory corruption in napi_get_value_string_* functions", "title": "Vulnerability summary" }, { "category": "other", "text": "NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8174" }, { "category": "external", "summary": "RHBZ#1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8174", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174" }, { "category": "external", "summary": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:27:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2848" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: memory corruption in napi_get_value_string_* functions" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:27:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2848" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.s390x", "AppStream-8.2.0.Z.MAIN.EUS:nodejs:10:8020020200617141353:4cda2c84:npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2895
Vulnerability from csaf_redhat
Published
2020-07-13 10:51
Modified
2024-11-13 22:13
Summary
Red Hat Security Advisory: rh-nodejs12-nodejs security update
Notes
Topic
An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.18.2).
Security Fix(es):
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.18.2).\n\nSecurity Fix(es):\n\n* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)\n\n* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2895", "url": "https://access.redhat.com/errata/RHSA-2020:2895" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1807349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807349" }, { "category": "external", "summary": "1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2895.json" } ], "title": "Red Hat Security Advisory: rh-nodejs12-nodejs security update", "tracking": { "current_release_date": "2024-11-13T22:13:50+00:00", "generator": { "date": "2024-11-13T22:13:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2020:2895", "initial_release_date": "2020-07-13T10:51:06+00:00", "revision_history": [ { "date": "2020-07-13T10:51:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-13T10:51:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:13:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.2-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.2-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "product": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "product_id": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.5-12.18.2.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.2-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.2-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.2-1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "product": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "product_id": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.5-12.18.2.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.2-1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "product": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "product_id": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.2-1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "product_id": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.2-1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "product": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "product_id": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.5-12.18.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.2-1.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "product": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "product_id": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.2-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "product": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "product_id": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-docs@12.18.2-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.2-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-devel@12.18.2-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "product": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "product_id": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-npm@6.14.5-12.18.2.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "product": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "product_id": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-debuginfo@12.18.2-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64" }, "product_reference": "rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch" }, "product_reference": "rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" }, "product_reference": "rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1813344" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay only includes minimist as a dependency of the test suites, and it not include it in the product. We may fix this issue in a future Red Hat Quay release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "RHBZ#1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" } ], "release_date": "2020-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-13T10:51:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-8172", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845247" } ], "notes": [ { "category": "description", "text": "A TLS Hostname verification bypass vulnerability exists in NodeJS. This flaw allows an attacker to bypass TLS Hostname verification when a TLS client reuses HTTPS sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: TLS session reuse can lead to hostname verification bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects the TLS 1.2 protocol, not TLS 1.3. This issue does not affect NodeJS 10.\n\nRed Hat Quay installed NodeJS as a dependency of Yarn. It does not use NodeJS at runtime, but executes Javascript on the client\u0027s browser instead. Therefore the impact of this vulnerability on Red Hat Quay is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8172" }, { "category": "external", "summary": "RHBZ#1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8172", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-13T10:51:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: TLS session reuse can lead to hostname verification bypass" }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845256" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: memory corruption in napi_get_value_string_* functions", "title": "Vulnerability summary" }, { "category": "other", "text": "NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8174" }, { "category": "external", "summary": "RHBZ#1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8174", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174" }, { "category": "external", "summary": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-13T10:51:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: memory corruption in napi_get_value_string_* functions" }, { "cve": "CVE-2020-10531", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2020-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1807349" } ], "notes": [ { "category": "description", "text": "An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Integer overflow in UnicodeString::doAppend()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10531" }, { "category": "external", "summary": "RHBZ#1807349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807349" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10531", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html", "url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html" } ], "release_date": "2020-02-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-13T10:51:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ICU: Integer overflow in UnicodeString::doAppend()" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-13T10:51:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-devel-0:12.18.2-1.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs12-nodejs-docs-0:12.18.2-1.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2755
Vulnerability from csaf_redhat
Published
2020-06-25 17:00
Modified
2024-11-15 08:32
Summary
Red Hat Security Advisory: nghttp2 security update
Notes
Topic
An update for nghttp2 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for nghttp2 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2755", "url": "https://access.redhat.com/errata/RHSA-2020:2755" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2755.json" } ], "title": "Red Hat Security Advisory: nghttp2 security update", "tracking": { "current_release_date": "2024-11-15T08:32:27+00:00", "generator": { "date": "2024-11-15T08:32:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2755", "initial_release_date": "2020-06-25T17:00:33+00:00", "revision_history": [ { "date": "2020-06-25T17:00:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-25T17:00:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:32:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "product": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "product_id": "libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-3.el8_2.1?arch=i686" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "product": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "product_id": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-3.el8_2.1?arch=i686" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "product_id": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-3.el8_2.1?arch=i686" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "product": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "product_id": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-3.el8_2.1?arch=i686" } } }, { "category": "product_version", "name": "libnghttp2-0:1.33.0-3.el8_2.1.i686", "product": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.i686", "product_id": "libnghttp2-0:1.33.0-3.el8_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "product": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "product_id": "libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-3.el8_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "nghttp2-0:1.33.0-3.el8_2.1.x86_64", "product": { "name": "nghttp2-0:1.33.0-3.el8_2.1.x86_64", "product_id": "nghttp2-0:1.33.0-3.el8_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-3.el8_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64", "product": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64", "product_id": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-3.el8_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "product_id": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-3.el8_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "product": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "product_id": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-3.el8_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "product": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "product_id": "libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "product": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "product_id": "libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-3.el8_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "product": { "name": "nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "product_id": "nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-3.el8_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "product": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "product_id": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-3.el8_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "product_id": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-3.el8_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "product": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "product_id": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-3.el8_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "product": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "product_id": "libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "product": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "product_id": "libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-3.el8_2.1?arch=s390x" } } }, { "category": "product_version", "name": "nghttp2-0:1.33.0-3.el8_2.1.s390x", "product": { "name": "nghttp2-0:1.33.0-3.el8_2.1.s390x", "product_id": "nghttp2-0:1.33.0-3.el8_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-3.el8_2.1?arch=s390x" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "product": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "product_id": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-3.el8_2.1?arch=s390x" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "product_id": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-3.el8_2.1?arch=s390x" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "product": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "product_id": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-3.el8_2.1?arch=s390x" } } }, { "category": "product_version", "name": "libnghttp2-0:1.33.0-3.el8_2.1.s390x", "product": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.s390x", "product_id": "libnghttp2-0:1.33.0-3.el8_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "product": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "product_id": "libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-3.el8_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "nghttp2-0:1.33.0-3.el8_2.1.aarch64", "product": { "name": "nghttp2-0:1.33.0-3.el8_2.1.aarch64", "product_id": "nghttp2-0:1.33.0-3.el8_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-3.el8_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "product": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "product_id": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-3.el8_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "product_id": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-3.el8_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "product": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "product_id": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-3.el8_2.1?arch=aarch64" } } }, { "category": "product_version", "name": "libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "product": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "product_id": "libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nghttp2-0:1.33.0-3.el8_2.1.src", "product": { "name": "nghttp2-0:1.33.0-3.el8_2.1.src", "product_id": "nghttp2-0:1.33.0-3.el8_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-3.el8_2.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.i686" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_2.1.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.i686" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "nghttp2-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "nghttp2-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_2.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.src" }, "product_reference": "nghttp2-0:1.33.0-3.el8_2.1.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "nghttp2-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.i686" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_2.1.i686", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.i686" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "nghttp2-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "nghttp2-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_2.1.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.src" }, "product_reference": "nghttp2-0:1.33.0-3.el8_2.1.src", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "nghttp2-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.src", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.src", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-25T17:00:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.src", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.src", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2755" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.src", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:libnghttp2-devel-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.src", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_2.1.x86_64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.aarch64", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.i686", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.s390x", "CRB-8.2.0.Z.MAIN.EUS:nghttp2-debugsource-0:1.33.0-3.el8_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2646
Vulnerability from csaf_redhat
Published
2020-06-22 13:08
Modified
2024-11-22 14:57
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update
Notes
Topic
Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 3 zip release for RHEL 6, RHEL 7 and Microsoft Windows is available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release adds the new Apache HTTP Server 2.4.37 Service Pack 3 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 2 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security fix(es):
* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)
* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)
* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* libxml2: There's a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c that could result in a crash (CVE-2019-19956)
* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)
* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)
* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 3 zip release for RHEL 6, RHEL 7 and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 3 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 2 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)\n* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)\n* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n* libxml2: There\u0027s a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c that could result in a crash (CVE-2019-19956)\n* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)\n* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)\n* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)\n* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2646", "url": "https://access.redhat.com/errata/RHSA-2020:2646" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.37", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.37" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/" }, { "category": "external", "summary": "1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "1723723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723" }, { "category": "external", "summary": "1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "external", "summary": "1788856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788856" }, { "category": "external", "summary": "1799734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799734" }, { "category": "external", "summary": "1799786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799786" }, { "category": "external", "summary": "1820772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820772" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "JBCS-941", "url": "https://issues.redhat.com/browse/JBCS-941" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2646.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update", "tracking": { "current_release_date": "2024-11-22T14:57:28+00:00", "generator": { "date": "2024-11-22T14:57:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2646", "initial_release_date": "2020-06-22T13:08:26+00:00", "revision_history": [ { "date": "2020-06-22T13:08:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-22T13:08:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:57:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20843", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1723723" } ], "notes": [ { "category": "description", "text": "It was discovered that the \"setElementTypePrefix()\" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "When processing a specially crafted XML file, expat may use more memory than ultimately necessary, which can also lead to increased CPU usage and longer processing times. Depending on available system resources and configuration, this may also lead to the application triggering the Out-Of-Memory-Killer, causing the application to be terminated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-20843" }, { "category": "external", "summary": "RHBZ#1723723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843" }, { "category": "external", "summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031" } ], "release_date": "2019-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T13:08:26+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS" }, { "cve": "CVE-2019-0196", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695030" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: read-after-free on a string compare", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0196" }, { "category": "external", "summary": "RHBZ#1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0196", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T13:08:26+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: read-after-free on a string compare" }, { "cve": "CVE-2019-0197", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695042" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: possible crash on late upgrade", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0197" }, { "category": "external", "summary": "RHBZ#1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0197", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T13:08:26+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: possible crash on late upgrade" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-09-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752592" } ], "notes": [ { "category": "description", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: heap-based buffer over-read via crafted XML input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15903" }, { "category": "external", "summary": "RHBZ#1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15903", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T13:08:26+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2646" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "expat: heap-based buffer over-read via crafted XML input" }, { "cve": "CVE-2019-19956", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788856" } ], "notes": [ { "category": "description", "text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19956" }, { "category": "external", "summary": "RHBZ#1788856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19956", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19956" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956" } ], "release_date": "2020-01-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T13:08:26+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c" }, { "cve": "CVE-2019-20388", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1799734" } ], "notes": [ { "category": "description", "text": "A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. System availability is the highest threat from this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20388" }, { "category": "external", "summary": "RHBZ#1799734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20388", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20388" } ], "release_date": "2020-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T13:08:26+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c" }, { "cve": "CVE-2020-1934", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2020-04-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1820772" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache\u0027s HTTP server (httpd) .The mod_proxy_ftp module may use uninitialized memory with proxying to a malicious FTP server. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ftp use of uninitialized value", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is caused by use of an uninitialized memory variable. Practically this has no impact, but in some corner cases it is possible that the contents of this variable could be read by a remote process, causing loss of confidentiality as a result of this. There is no evidence of code execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1934" }, { "category": "external", "summary": "RHBZ#1820772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820772" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1934", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1934" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1934", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1934" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2020-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T13:08:26+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_proxy_ftp use of uninitialized value" }, { "cve": "CVE-2020-7595", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1799786" } ], "notes": [ { "category": "description", "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7595" }, { "category": "external", "summary": "RHBZ#1799786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7595", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595" } ], "release_date": "2020-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T13:08:26+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T13:08:26+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2646" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_3042
Vulnerability from csaf_redhat
Published
2020-07-21 14:34
Modified
2024-11-15 08:34
Summary
Red Hat Security Advisory: nodejs:10 security update
Notes
Topic
An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.21.0).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (10.21.0).\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3042", "url": "https://access.redhat.com/errata/RHSA-2020:3042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3042.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2024-11-15T08:34:11+00:00", "generator": { "date": "2024-11-15T08:34:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:3042", "initial_release_date": "2020-07-21T14:34:45+00:00", "revision_history": [ { "date": "2020-07-21T14:34:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-21T14:34:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:34:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8000020200617115915:f8e95b4e", "product": { "name": "nodejs:10:8000020200617115915:f8e95b4e", "product_id": "nodejs:10:8000020200617115915:f8e95b4e", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8000020200617115915:f8e95b4e" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "product": { "name": "nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "product_id": "nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "product": { "name": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "product_id": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product": { "name": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product_id": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product_id": "nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product_id": "nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product": { "name": "nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product_id": "nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product_id": "nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64", "product": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64", "product_id": "npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.4-1.10.21.0.3.module%2Bel8.0.0%2B7067%2B054302d1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product": { "name": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product_id": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product_id": "nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product_id": "nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product": { "name": "nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product_id": "nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product_id": "nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.21.0-3.module%2Bel8.0.0%2B7067%2B054302d1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "product": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "product_id": "npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.4-1.10.21.0.3.module%2Bel8.0.0%2B7067%2B054302d1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, "product_reference": "nodejs:10:8000020200617115915:f8e95b4e", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64 as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64 as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64 as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64" }, "product_reference": "nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le" }, "product_reference": "nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64 as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64" }, "product_reference": "nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch" }, "product_reference": "nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le" }, "product_reference": "nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64 as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64" }, "product_reference": "nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le" }, "product_reference": "npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64 as a component of nodejs:10:8000020200617115915:f8e95b4e as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64" }, "product_reference": "npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1813344" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay only includes minimist as a dependency of the test suites, and it not include it in the product. We may fix this issue in a future Red Hat Quay release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "RHBZ#1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" } ], "release_date": "2020-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T14:34:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845256" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: memory corruption in napi_get_value_string_* functions", "title": "Vulnerability summary" }, { "category": "other", "text": "NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8174" }, { "category": "external", "summary": "RHBZ#1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8174", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174" }, { "category": "external", "summary": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T14:34:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: memory corruption in napi_get_value_string_* functions" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T14:34:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1.x86_64", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.ppc64le", "AppStream-8.0.0.Z.E4S:nodejs:10:8000020200617115915:f8e95b4e:npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2850
Vulnerability from csaf_redhat
Published
2020-07-07 09:03
Modified
2024-11-15 08:32
Summary
Red Hat Security Advisory: nghttp2 security update
Notes
Topic
An update for nghttp2 is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for nghttp2 is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2850", "url": "https://access.redhat.com/errata/RHSA-2020:2850" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2850.json" } ], "title": "Red Hat Security Advisory: nghttp2 security update", "tracking": { "current_release_date": "2024-11-15T08:32:32+00:00", "generator": { "date": "2024-11-15T08:32:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2850", "initial_release_date": "2020-07-07T09:03:09+00:00", "revision_history": [ { "date": "2020-07-07T09:03:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-07T09:03:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:32:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-0:1.33.0-1.el8_0.2.i686", "product": { "name": "libnghttp2-0:1.33.0-1.el8_0.2.i686", "product_id": "libnghttp2-0:1.33.0-1.el8_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-1.el8_0.2?arch=i686" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.i686", "product": { "name": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.i686", "product_id": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-1.el8_0.2?arch=i686" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "product_id": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-1.el8_0.2?arch=i686" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "product": { "name": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "product_id": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-1.el8_0.2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-0:1.33.0-1.el8_0.2.x86_64", "product": { "name": "libnghttp2-0:1.33.0-1.el8_0.2.x86_64", "product_id": "libnghttp2-0:1.33.0-1.el8_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-1.el8_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.x86_64", "product": { "name": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.x86_64", "product_id": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-1.el8_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "product_id": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-1.el8_0.2?arch=x86_64" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "product": { "name": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "product_id": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-1.el8_0.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-0:1.33.0-1.el8_0.2.ppc64le", "product": { "name": "libnghttp2-0:1.33.0-1.el8_0.2.ppc64le", "product_id": "libnghttp2-0:1.33.0-1.el8_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-1.el8_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.ppc64le", "product": { "name": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.ppc64le", "product_id": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-1.el8_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "product_id": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-1.el8_0.2?arch=ppc64le" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "product": { "name": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "product_id": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-1.el8_0.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nghttp2-0:1.33.0-1.el8_0.2.src", "product": { "name": "nghttp2-0:1.33.0-1.el8_0.2.src", "product_id": "nghttp2-0:1.33.0-1.el8_0.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-1.el8_0.2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-1.el8_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.i686" }, "product_reference": "libnghttp2-0:1.33.0-1.el8_0.2.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-1.el8_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.ppc64le" }, "product_reference": "libnghttp2-0:1.33.0-1.el8_0.2.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-1.el8_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.x86_64" }, "product_reference": "libnghttp2-0:1.33.0-1.el8_0.2.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-1.el8_0.2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:nghttp2-0:1.33.0-1.el8_0.2.src" }, "product_reference": "nghttp2-0:1.33.0-1.el8_0.2.src", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.i686" }, "product_reference": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.i686", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.ppc64le" }, "product_reference": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.x86_64" }, "product_reference": "nghttp2-debugsource-0:1.33.0-1.el8_0.2.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.x86_64", "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "BaseOS-8.0.0.Z.E4S:nghttp2-0:1.33.0-1.el8_0.2.src", "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:03:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.x86_64", "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "BaseOS-8.0.0.Z.E4S:nghttp2-0:1.33.0-1.el8_0.2.src", "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2850" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:libnghttp2-0:1.33.0-1.el8_0.2.x86_64", "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:libnghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "BaseOS-8.0.0.Z.E4S:nghttp2-0:1.33.0-1.el8_0.2.src", "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:nghttp2-debuginfo-0:1.33.0-1.el8_0.2.x86_64", "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.i686", "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.ppc64le", "BaseOS-8.0.0.Z.E4S:nghttp2-debugsource-0:1.33.0-1.el8_0.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2524
Vulnerability from csaf_redhat
Published
2020-06-11 07:04
Modified
2024-11-15 08:31
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-proxy security update
Notes
Topic
An update for servicemesh-proxy is now available for OpenShift Service Mesh 1.0.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for servicemesh-proxy is now available for OpenShift Service Mesh 1.0.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2524", "url": "https://access.redhat.com/errata/RHSA-2020:2524" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2524.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.0 servicemesh-proxy security update", "tracking": { "current_release_date": "2024-11-15T08:31:07+00:00", "generator": { "date": "2024-11-15T08:31:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2524", "initial_release_date": "2020-06-11T07:04:44+00:00", "revision_history": [ { "date": "2020-06-11T07:04:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-11T07:04:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:31:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.0", "product": { "name": "OpenShift Service Mesh 1.0", "product_id": "8Base-OSSM-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:1.0.10-3.el8.x86_64", "product": { "name": "servicemesh-proxy-0:1.0.10-3.el8.x86_64", "product_id": "servicemesh-proxy-0:1.0.10-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.0.10-3.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:1.0.10-3.el8.src", "product": { "name": "servicemesh-proxy-0:1.0.10-3.el8.src", "product_id": "servicemesh-proxy-0:1.0.10-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.0.10-3.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.0.10-3.el8.src as a component of OpenShift Service Mesh 1.0", "product_id": "8Base-OSSM-1.0:servicemesh-proxy-0:1.0.10-3.el8.src" }, "product_reference": "servicemesh-proxy-0:1.0.10-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.0.10-3.el8.x86_64 as a component of OpenShift Service Mesh 1.0", "product_id": "8Base-OSSM-1.0:servicemesh-proxy-0:1.0.10-3.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:1.0.10-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-1.0:servicemesh-proxy-0:1.0.10-3.el8.src", "8Base-OSSM-1.0:servicemesh-proxy-0:1.0.10-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-11T07:04:44+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-1.0:servicemesh-proxy-0:1.0.10-3.el8.src", "8Base-OSSM-1.0:servicemesh-proxy-0:1.0.10-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2524" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-1.0:servicemesh-proxy-0:1.0.10-3.el8.src", "8Base-OSSM-1.0:servicemesh-proxy-0:1.0.10-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2849
Vulnerability from csaf_redhat
Published
2020-07-07 09:17
Modified
2024-11-15 08:32
Summary
Red Hat Security Advisory: nodejs:10 security update
Notes
Topic
An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.21.0).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (10.21.0).\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2849", "url": "https://access.redhat.com/errata/RHSA-2020:2849" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2849.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2024-11-15T08:32:47+00:00", "generator": { "date": "2024-11-15T08:32:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2849", "initial_release_date": "2020-07-07T09:17:33+00:00", "revision_history": [ { "date": "2020-07-07T09:17:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-07T09:17:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:32:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8010020200617134056:c27ad7f8", "product": { "name": "nodejs:10:8010020200617134056:c27ad7f8", "product_id": "nodejs:10:8010020200617134056:c27ad7f8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@10:8010020200617134056:c27ad7f8" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "product": { "name": "nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "product_id": "nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "product": { "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "product_id": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product": { "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product_id": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product_id": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product_id": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product": { "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product_id": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product_id": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64", "product": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64", "product_id": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.4-1.10.21.0.3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product": { "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product_id": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product_id": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product_id": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product": { "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product_id": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product_id": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "product": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "product_id": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.4-1.10.21.0.3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product": { "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product_id": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product_id": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product_id": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product": { "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product_id": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product_id": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "product": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "product_id": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.4-1.10.21.0.3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product": { "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product_id": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product_id": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product_id": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product": { "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product_id": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product_id": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@10.21.0-3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "product": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "product_id": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.4-1.10.21.0.3.module%2Bel8.1.0%2B7070%2Bfe09e702?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, "product_reference": "nodejs:10:8010020200617134056:c27ad7f8", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64" }, "product_reference": "nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x" }, "product_reference": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64" }, "product_reference": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x" }, "product_reference": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64" }, "product_reference": "nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64" }, "product_reference": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le" }, "product_reference": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x" }, "product_reference": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64" }, "product_reference": "nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch" }, "product_reference": "nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64" }, "product_reference": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le" }, "product_reference": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x" }, "product_reference": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64" }, "product_reference": "nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64" }, "product_reference": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le" }, "product_reference": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x" }, "product_reference": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64 as a component of nodejs:10:8010020200617134056:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64" }, "product_reference": "npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1813344" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay only includes minimist as a dependency of the test suites, and it not include it in the product. We may fix this issue in a future Red Hat Quay release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "RHBZ#1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" } ], "release_date": "2020-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:17:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2849" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845256" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: memory corruption in napi_get_value_string_* functions", "title": "Vulnerability summary" }, { "category": "other", "text": "NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8174" }, { "category": "external", "summary": "RHBZ#1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8174", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174" }, { "category": "external", "summary": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:17:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2849" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: memory corruption in napi_get_value_string_* functions" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:17:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2849" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.s390x", "AppStream-8.1.0.Z.EUS:nodejs:10:8010020200617134056:c27ad7f8:npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2823
Vulnerability from csaf_redhat
Published
2020-07-06 20:36
Modified
2024-11-05 22:25
Summary
Red Hat Security Advisory: nghttp2 security update
Notes
Topic
An update for nghttp2 is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for nghttp2 is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2823", "url": "https://access.redhat.com/errata/RHSA-2020:2823" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2823.json" } ], "title": "Red Hat Security Advisory: nghttp2 security update", "tracking": { "current_release_date": "2024-11-05T22:25:28+00:00", "generator": { "date": "2024-11-05T22:25:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2020:2823", "initial_release_date": "2020-07-06T20:36:16+00:00", "revision_history": [ { "date": "2020-07-06T20:36:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-06T20:36:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T22:25:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "product": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "product_id": "libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-3.el8_1.1?arch=i686" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "product": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "product_id": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-3.el8_1.1?arch=i686" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "product_id": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-3.el8_1.1?arch=i686" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "product": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "product_id": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-3.el8_1.1?arch=i686" } } }, { "category": "product_version", "name": "libnghttp2-0:1.33.0-3.el8_1.1.i686", "product": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.i686", "product_id": "libnghttp2-0:1.33.0-3.el8_1.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_1.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "product": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "product_id": "libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-3.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "nghttp2-0:1.33.0-3.el8_1.1.x86_64", "product": { "name": "nghttp2-0:1.33.0-3.el8_1.1.x86_64", "product_id": "nghttp2-0:1.33.0-3.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-3.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64", "product": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64", "product_id": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-3.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "product_id": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-3.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "product": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "product_id": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-3.el8_1.1?arch=x86_64" } } }, { "category": "product_version", "name": "libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "product": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "product_id": "libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_1.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "product": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "product_id": "libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-3.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "product": { "name": "nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "product_id": "nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-3.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "product": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "product_id": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-3.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "product_id": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-3.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "product": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "product_id": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-3.el8_1.1?arch=ppc64le" } } }, { "category": "product_version", "name": "libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "product": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "product_id": "libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_1.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "product": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "product_id": "libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-3.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "nghttp2-0:1.33.0-3.el8_1.1.s390x", "product": { "name": "nghttp2-0:1.33.0-3.el8_1.1.s390x", "product_id": "nghttp2-0:1.33.0-3.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-3.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "product": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "product_id": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-3.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "product_id": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-3.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "product": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "product_id": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-3.el8_1.1?arch=s390x" } } }, { "category": "product_version", "name": "libnghttp2-0:1.33.0-3.el8_1.1.s390x", "product": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.s390x", "product_id": "libnghttp2-0:1.33.0-3.el8_1.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_1.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "product": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "product_id": "libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-devel@1.33.0-3.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "nghttp2-0:1.33.0-3.el8_1.1.aarch64", "product": { "name": "nghttp2-0:1.33.0-3.el8_1.1.aarch64", "product_id": "nghttp2-0:1.33.0-3.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-3.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "product": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "product_id": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debugsource@1.33.0-3.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "product": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "product_id": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2-debuginfo@1.33.0-3.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "product": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "product_id": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2-debuginfo@1.33.0-3.el8_1.1?arch=aarch64" } } }, { "category": "product_version", "name": "libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "product": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "product_id": "libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_1.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nghttp2-0:1.33.0-3.el8_1.1.src", "product": { "name": "nghttp2-0:1.33.0-3.el8_1.1.src", "product_id": "nghttp2-0:1.33.0-3.el8_1.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nghttp2@1.33.0-3.el8_1.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.i686" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_1.1.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.i686" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "nghttp2-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "nghttp2-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_1.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.src" }, "product_reference": "nghttp2-0:1.33.0-3.el8_1.1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "nghttp2-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.i686" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_1.1.i686", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.i686" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "nghttp2-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "nghttp2-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_1.1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.src" }, "product_reference": "nghttp2-0:1.33.0-3.el8_1.1.src", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "nghttp2-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64" }, "product_reference": "nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.src", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.src", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-06T20:36:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.src", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.src", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2823" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.src", "BaseOS-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "BaseOS-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:libnghttp2-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:libnghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:libnghttp2-devel-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.src", "CRB-8.1.0.Z.EUS:nghttp2-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:nghttp2-debuginfo-0:1.33.0-3.el8_1.1.x86_64", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.aarch64", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.i686", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.ppc64le", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.s390x", "CRB-8.1.0.Z.EUS:nghttp2-debugsource-0:1.33.0-3.el8_1.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2523
Vulnerability from csaf_redhat
Published
2020-06-11 06:50
Modified
2024-11-15 08:31
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.2 servicemesh-proxy security update
Notes
Topic
An update for servicemesh-proxy is now available for OpenShift Service Mesh 1.1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for servicemesh-proxy is now available for OpenShift Service Mesh 1.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2523", "url": "https://access.redhat.com/errata/RHSA-2020:2523" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2523.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 1.1.2 servicemesh-proxy security update", "tracking": { "current_release_date": "2024-11-15T08:31:13+00:00", "generator": { "date": "2024-11-15T08:31:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2523", "initial_release_date": "2020-06-11T06:50:01+00:00", "revision_history": [ { "date": "2020-06-11T06:50:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-11T06:50:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:31:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 1.1", "product": { "name": "OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:1.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:1.1.2-3.el8.x86_64", "product": { "name": "servicemesh-proxy-0:1.1.2-3.el8.x86_64", "product_id": "servicemesh-proxy-0:1.1.2-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.2-3.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:1.1.2-3.el8.src", "product": { "name": "servicemesh-proxy-0:1.1.2-3.el8.src", "product_id": "servicemesh-proxy-0:1.1.2-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@1.1.2-3.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.2-3.el8.src as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.2-3.el8.src" }, "product_reference": "servicemesh-proxy-0:1.1.2-3.el8.src", "relates_to_product_reference": "8Base-OSSM-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:1.1.2-3.el8.x86_64 as a component of OpenShift Service Mesh 1.1", "product_id": "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.2-3.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:1.1.2-3.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-1.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.2-3.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.2-3.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-11T06:50:01+00:00", "details": "The OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.2-3.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.2-3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2523" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.2-3.el8.src", "8Base-OSSM-1.1:servicemesh-proxy-0:1.1.2-3.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_3084
Vulnerability from csaf_redhat
Published
2020-07-21 19:32
Modified
2024-11-15 08:34
Summary
Red Hat Security Advisory: rh-nodejs10-nodejs security update
Notes
Topic
An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.21.0).
Security Fix(es):
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.21.0).\n\nSecurity Fix(es):\n\n* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3084", "url": "https://access.redhat.com/errata/RHSA-2020:3084" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1807349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807349" }, { "category": "external", "summary": "1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3084.json" } ], "title": "Red Hat Security Advisory: rh-nodejs10-nodejs security update", "tracking": { "current_release_date": "2024-11-15T08:34:26+00:00", "generator": { "date": "2024-11-15T08:34:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:3084", "initial_release_date": "2020-07-21T19:32:07+00:00", "revision_history": [ { "date": "2020-07-21T19:32:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-21T19:32:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:34:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.21.0-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.21.0-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "product": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "product_id": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.4-10.21.0.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.21.0-3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.21.0-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.21.0-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "product": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "product_id": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.4-10.21.0.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.21.0-3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.21.0-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.21.0-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "product": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "product_id": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.4-10.21.0.3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.21.0-3.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "product": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "product_id": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.21.0-3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "product": { "name": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "product_id": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-docs@10.21.0-3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.21.0-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.21.0-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "product": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "product_id": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.14.4-10.21.0.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.21.0-3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1813344" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay only includes minimist as a dependency of the test suites, and it not include it in the product. We may fix this issue in a future Red Hat Quay release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "RHBZ#1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" } ], "release_date": "2020-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T19:32:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3084" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845256" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: memory corruption in napi_get_value_string_* functions", "title": "Vulnerability summary" }, { "category": "other", "text": "NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8174" }, { "category": "external", "summary": "RHBZ#1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8174", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174" }, { "category": "external", "summary": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T19:32:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3084" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: memory corruption in napi_get_value_string_* functions" }, { "cve": "CVE-2020-10531", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2020-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1807349" } ], "notes": [ { "category": "description", "text": "An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Integer overflow in UnicodeString::doAppend()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10531" }, { "category": "external", "summary": "RHBZ#1807349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807349" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10531", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html", "url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html" } ], "release_date": "2020-02-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T19:32:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3084" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ICU: Integer overflow in UnicodeString::doAppend()" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T19:32:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3084" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-Alt-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.6.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5-7.7.Z:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Server-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Server-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.src", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-devel-0:10.21.0-3.el7.x86_64", "7Workstation-RHSCL-3.5:rh-nodejs10-nodejs-docs-0:10.21.0-3.el7.noarch", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.aarch64", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.ppc64le", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.s390x", "7Workstation-RHSCL-3.5:rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2644
Vulnerability from csaf_redhat
Published
2020-06-22 12:28
Modified
2024-11-22 14:57
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update
Notes
Topic
Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release adds the new Apache HTTP Server 2.4.37 Service Pack 3 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 2 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.
Security fix(es):
* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)
* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)
* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* libxml2: There's a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c that could result in a crash (CVE-2019-19956)
* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)
* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)
* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Core Services Pack Apache Server 2.4.37 and fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 3 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 2 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)\n* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)\n* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n* libxml2: There\u0027s a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c that could result in a crash (CVE-2019-19956)\n* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)\n* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)\n* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)\n* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2644", "url": "https://access.redhat.com/errata/RHSA-2020:2644" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "1723723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723" }, { "category": "external", "summary": "1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "external", "summary": "1788856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788856" }, { "category": "external", "summary": "1799734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799734" }, { "category": "external", "summary": "1799786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799786" }, { "category": "external", "summary": "1820772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820772" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "JBCS-941", "url": "https://issues.redhat.com/browse/JBCS-941" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2644.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update", "tracking": { "current_release_date": "2024-11-22T14:57:20+00:00", "generator": { "date": "2024-11-22T14:57:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2644", "initial_release_date": "2020-06-22T12:28:02+00:00", "revision_history": [ { "date": "2020-06-22T12:28:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-06-22T12:28:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:57:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el6" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-25.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-25.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-25.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "product_id": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-36.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "product_id": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.64.1-36.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "product_id": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.64.1-36.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.64.1-36.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-57.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-57.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-57.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-3.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-3.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-4.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-4.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-4.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-24.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-24.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-51.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-51.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-4.Final_redhat_2.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.14-4.Final_redhat_2.jbcs.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-25.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-25.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-25.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-36.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.64.1-36.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.64.1-36.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.64.1-36.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-57.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-57.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-57.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-3.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-3.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-4.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-4.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-4.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-24.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-24.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-51.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-51.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-4.Final_redhat_2.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.14-4.Final_redhat_2.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-25.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-25.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-25.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-36.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.64.1-36.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.64.1-36.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.64.1-36.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-57.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-57.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-57.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-7.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-7.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-3.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-4.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-4.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-4.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-24.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-24.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-51.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-51.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-4.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.14-4.Final_redhat_2.jbcs.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-25.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "product_id": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-36.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-57.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-3.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-4.redhat_1.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-24.jbcs.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-51.GA.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-4.Final_redhat_2.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-25.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "product": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "product_id": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.64.1-36.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-57.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-7.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-3.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-4.redhat_1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-24.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-51.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.14-4.Final_redhat_2.jbcs.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-57.jbcs.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-57.jbcs.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20843", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1723723" } ], "notes": [ { "category": "description", "text": "It was discovered that the \"setElementTypePrefix()\" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "When processing a specially crafted XML file, expat may use more memory than ultimately necessary, which can also lead to increased CPU usage and longer processing times. Depending on available system resources and configuration, this may also lead to the application triggering the Out-Of-Memory-Killer, causing the application to be terminated.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-20843" }, { "category": "external", "summary": "RHBZ#1723723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723723" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20843", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20843" }, { "category": "external", "summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031" } ], "release_date": "2019-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: large number of colons in input makes parser consume high amount of resources, leading to DoS" }, { "cve": "CVE-2019-0196", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695030" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: read-after-free on a string compare", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0196" }, { "category": "external", "summary": "RHBZ#1695030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0196", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0196" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: read-after-free on a string compare" }, { "cve": "CVE-2019-0197", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695042" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set \"H2Upgrade on\" are unaffected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_http2: possible crash on late upgrade", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0197" }, { "category": "external", "summary": "RHBZ#1695042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0197", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0197" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_http2: possible crash on late upgrade" }, { "cve": "CVE-2019-15903", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-09-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752592" } ], "notes": [ { "category": "description", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: heap-based buffer over-read via crafted XML input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15903" }, { "category": "external", "summary": "RHBZ#1752592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752592" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15903", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15903" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "expat: heap-based buffer over-read via crafted XML input" }, { "cve": "CVE-2019-19956", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2020-01-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1788856" } ], "notes": [ { "category": "description", "text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19956" }, { "category": "external", "summary": "RHBZ#1788856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19956", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19956" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956" } ], "release_date": "2020-01-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c" }, { "cve": "CVE-2019-20388", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1799734" } ], "notes": [ { "category": "description", "text": "A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. System availability is the highest threat from this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20388" }, { "category": "external", "summary": "RHBZ#1799734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20388", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20388" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20388", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20388" } ], "release_date": "2020-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c" }, { "cve": "CVE-2020-1934", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2020-04-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1820772" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache\u0027s HTTP server (httpd) .The mod_proxy_ftp module may use uninitialized memory with proxying to a malicious FTP server. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ftp use of uninitialized value", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is caused by use of an uninitialized memory variable. Practically this has no impact, but in some corner cases it is possible that the contents of this variable could be read by a remote process, causing loss of confidentiality as a result of this. There is no evidence of code execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1934" }, { "category": "external", "summary": "RHBZ#1820772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820772" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1934", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1934" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1934", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1934" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2020-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_proxy_ftp use of uninitialized value" }, { "cve": "CVE-2020-7595", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1799786" } ], "notes": [ { "category": "description", "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7595" }, { "category": "external", "summary": "RHBZ#1799786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7595", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595" } ], "release_date": "2020-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-06-22T12:28:02+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2644" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-4.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2847
Vulnerability from csaf_redhat
Published
2020-07-07 09:14
Modified
2024-11-13 22:13
Summary
Red Hat Security Advisory: nodejs:12 security update
Notes
Topic
An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (12.18.2).
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)
* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)
* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:12 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (12.18.2).\n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\n* nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload (CVE-2020-7598)\n\n* nodejs: TLS session reuse can lead to hostname verification bypass (CVE-2020-8172)\n\n* nodejs: memory corruption in napi_get_value_string_* functions (CVE-2020-8174)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2847", "url": "https://access.redhat.com/errata/RHSA-2020:2847" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2847.json" } ], "title": "Red Hat Security Advisory: nodejs:12 security update", "tracking": { "current_release_date": "2024-11-13T22:13:25+00:00", "generator": { "date": "2024-11-13T22:13:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2020:2847", "initial_release_date": "2020-07-07T09:14:43+00:00", "revision_history": [ { "date": "2020-07-07T09:14:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-07T09:14:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-13T22:13:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:12:8010020200630154708:c27ad7f8", "product": { "name": "nodejs:12:8010020200630154708:c27ad7f8", "product_id": "nodejs:12:8010020200630154708:c27ad7f8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/nodejs@12:8010020200630154708:c27ad7f8" } } }, { "category": "product_version", "name": "nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "product": { "name": "nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "product_id": "nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "product": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "product_id": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_id": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8.1.0%2B3369%2B37ae6a45?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@12.18.2-1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "product": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_id": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.14.5-1.12.18.2.1.module%2Bel8.1.0%2B7232%2Bf8b5ede5?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, "product_reference": "nodejs:12:8010020200630154708:c27ad7f8", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch" }, "product_reference": "nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64 as a component of nodejs:12:8010020200630154708:c27ad7f8 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" }, "product_reference": "npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7598", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1813344" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-minimist, where it was tricked into adding or modifying properties of the Object.prototype using a \"constructor\" or \"__proto__\" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay only includes minimist as a dependency of the test suites, and it not include it in the product. We may fix this issue in a future Red Hat Quay release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7598" }, { "category": "external", "summary": "RHBZ#1813344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1813344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7598", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7598" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764", "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764" } ], "release_date": "2020-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:14:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2847" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload" }, { "cve": "CVE-2020-8172", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845247" } ], "notes": [ { "category": "description", "text": "A TLS Hostname verification bypass vulnerability exists in NodeJS. This flaw allows an attacker to bypass TLS Hostname verification when a TLS client reuses HTTPS sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: TLS session reuse can lead to hostname verification bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects the TLS 1.2 protocol, not TLS 1.3. This issue does not affect NodeJS 10.\n\nRed Hat Quay installed NodeJS as a dependency of Yarn. It does not use NodeJS at runtime, but executes Javascript on the client\u0027s browser instead. Therefore the impact of this vulnerability on Red Hat Quay is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8172" }, { "category": "external", "summary": "RHBZ#1845247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8172", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8172" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:14:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2847" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: TLS session reuse can lead to hostname verification bypass" }, { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845256" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs. Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: memory corruption in napi_get_value_string_* functions", "title": "Vulnerability summary" }, { "category": "other", "text": "NodeJS is a build time dependency of Red Hat Quay and is not used at runtime. Therefore this issue will not fixed in Quay 3.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8174" }, { "category": "external", "summary": "RHBZ#1845256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8174", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8174" }, { "category": "external", "summary": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:14:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2847" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: memory corruption in napi_get_value_string_* functions" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-07T09:14:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2847" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5.x86_64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.noarch", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45.src", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.aarch64", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.ppc64le", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.s390x", "AppStream-8.1.0.Z.EUS:nodejs:12:8010020200630154708:c27ad7f8:npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
rhsa-2020_2784
Vulnerability from csaf_redhat
Published
2020-07-01 12:39
Modified
2024-11-15 08:32
Summary
Red Hat Security Advisory: httpd24-nghttp2 security update
Notes
Topic
An update for httpd24-nghttp2 is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd24-nghttp2 is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C. \n\nSecurity Fix(es):\n\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:2784", "url": "https://access.redhat.com/errata/RHSA-2020:2784" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_2784.json" } ], "title": "Red Hat Security Advisory: httpd24-nghttp2 security update", "tracking": { "current_release_date": "2024-11-15T08:32:49+00:00", "generator": { "date": "2024-11-15T08:32:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:2784", "initial_release_date": "2020-07-01T12:39:28+00:00", "revision_history": [ { "date": "2020-07-01T12:39:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-01T12:39:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T08:32:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "product": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "product_id": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2@1.7.1-8.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "product": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "product_id": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2-devel@1.7.1-8.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "product": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "product_id": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-8.el7.1?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "product": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "product_id": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2-debuginfo@1.7.1-8.el7.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "product": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "product_id": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2@1.7.1-8.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "product": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "product_id": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2-devel@1.7.1-8.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "product": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "product_id": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-8.el7.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "product": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "product_id": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2-debuginfo@1.7.1-8.el7.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "product": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "product_id": "httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2@1.7.1-8.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "product": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "product_id": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2-devel@1.7.1-8.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "product": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "product_id": "httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-8.el7.1?arch=aarch64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "product": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "product_id": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2-debuginfo@1.7.1-8.el7.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.src", "product": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.src", "product_id": "httpd24-nghttp2-0:1.7.1-8.el7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-8.el7.1?arch=src" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-8.el6.1.src", "product": { "name": "httpd24-nghttp2-0:1.7.1-8.el6.1.src", "product_id": "httpd24-nghttp2-0:1.7.1-8.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-8.el6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "product": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "product_id": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2@1.7.1-8.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "product": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "product_id": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2-devel@1.7.1-8.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "product": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "product_id": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-8.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "product": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "product_id": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2-debuginfo@1.7.1-8.el7.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "product": { "name": "httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "product_id": "httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2@1.7.1-8.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "product": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "product_id": "httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-libnghttp2-devel@1.7.1-8.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "product": { "name": "httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "product_id": "httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2@1.7.1-8.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "product": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "product_id": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-nghttp2-debuginfo@1.7.1-8.el6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el6.1.src", "relates_to_product_reference": "6Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.src", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.src", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64" }, "product_reference": "httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.5" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2020-11080", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2020-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1844929" } ], "notes": [ { "category": "description", "text": "A resource consumption vulnerability was found in nghttp2. This flaw allows an attacker to repeatedly construct an overly large HTTP/2 SETTINGS frame with a length of 14,400 bytes that causes excessive CPU usage, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nghttp2: overly large SETTINGS frames can lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "6Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "6Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.src", "6Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "6Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.src", "6Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11080" }, { "category": "external", "summary": "RHBZ#1844929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11080", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11080" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" } ], "release_date": "2020-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-01T12:39:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "6Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "6Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.src", "6Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "6Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.src", "6Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:2784" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "6Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "6Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.src", "6Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "6Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.src", "6Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el6.1.x86_64", "6Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-Alt-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.6.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5-7.7.Z:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Server-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Server-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-libnghttp2-devel-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.src", "7Workstation-RHSCL-3.5:httpd24-nghttp2-0:1.7.1-8.el7.1.x86_64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.aarch64", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.ppc64le", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.s390x", "7Workstation-RHSCL-3.5:httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nghttp2: overly large SETTINGS frames can lead to DoS" } ] }
icsa-22-090-02
Vulnerability from csaf_cisa
Published
2022-03-31 00:00
Modified
2022-03-31 00:00
Summary
Hitachi Energy e-mesh EMS
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could cause a denial-of-service condition.
Critical infrastructure sectors
Energy
Countries/areas deployed
Worldwide
Company headquarters location
Switzerland
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could cause a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-090-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-090-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-090-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-090-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-090-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Hitachi Energy e-mesh EMS", "tracking": { "current_release_date": "2022-03-31T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-090-02", "initial_release_date": "2022-03-31T00:00:00.000000Z", "revision_history": [ { "date": "2022-03-31T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-090-02 Hitachi Energy e-mesh EMS" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "1", "product": { "name": "e-mesh EMS: Version 1.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "e-mesh EMS" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-8174", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in a specific Node.js function, which could allow various kinds of memory corruption and cause a denial-of-service condition.CVE-2020-8174 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8174" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to e-mesh: EMS 1.0.1 or later.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Do not directly connect to the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Separate from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please see Hitachi Energy advisory 8DBD000077 for additional mitigation and updated information.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000077\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "For additional information and access to updated firmware, please contact the Hitachi Energy service organization.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.hitachienergy.com/contact-us/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The affected product version of Node.js is vulnerable to a Use After Free bug in its TLS implementation. This could cause corruption of memory leading to a denial-of-service condition.CVE-2020-8265 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8265" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to e-mesh: EMS 1.0.1 or later.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Do not directly connect to the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Separate from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please see Hitachi Energy advisory 8DBD000077 for additional mitigation and updated information.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000077\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "For additional information and access to updated firmware, please contact the Hitachi Energy service organization.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.hitachienergy.com/contact-us/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-11080", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The affected product version of Node.js is vulnerable to an error in the HTTP/2 session frame, which is limited to 32 settings by default. An attacker could consume all available CPU resources causing a denial-of-service condition.CVE-2020-11080 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-11080" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to e-mesh: EMS 1.0.1 or later.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Do not directly connect to the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Separate from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please see Hitachi Energy advisory 8DBD000077 for additional mitigation and updated information.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000077\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "For additional information and access to updated firmware, please contact the Hitachi Energy service organization.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.hitachienergy.com/contact-us/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The affected product version of Node.js is affected by too many connection attempts with an unknown protocol. This could allow an attacker to cause a denial-of-service condition.CVE-2021-22883 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22883" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy recommends users update to e-mesh: EMS 1.0.1 or later.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Do not directly connect to the Internet.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Separate from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Please see Hitachi Energy advisory 8DBD000077 for additional mitigation and updated information.", "product_ids": [ "CSAFPID-0001" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000077\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "For additional information and access to updated firmware, please contact the Hitachi Energy service organization.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.hitachienergy.com/contact-us/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
gsd-2020-11080
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-11080", "description": "In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., \u003e 32), then drop the connection.", "id": "GSD-2020-11080", "references": [ "https://www.suse.com/security/cve/CVE-2020-11080.html", "https://www.debian.org/security/2020/dsa-4696", "https://access.redhat.com/errata/RHSA-2020:3084", "https://access.redhat.com/errata/RHSA-2020:3042", "https://access.redhat.com/errata/RHSA-2020:2895", "https://access.redhat.com/errata/RHSA-2020:2852", "https://access.redhat.com/errata/RHSA-2020:2850", "https://access.redhat.com/errata/RHSA-2020:2849", "https://access.redhat.com/errata/RHSA-2020:2848", "https://access.redhat.com/errata/RHSA-2020:2847", "https://access.redhat.com/errata/RHSA-2020:2823", "https://access.redhat.com/errata/RHSA-2020:2784", "https://access.redhat.com/errata/RHSA-2020:2755", "https://access.redhat.com/errata/RHSA-2020:2646", "https://access.redhat.com/errata/RHSA-2020:2644", "https://access.redhat.com/errata/RHSA-2020:2524", "https://access.redhat.com/errata/RHSA-2020:2523", "https://advisories.mageia.org/CVE-2020-11080.html", "https://alas.aws.amazon.com/cve/html/CVE-2020-11080.html", "https://linux.oracle.com/cve/CVE-2020-11080.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-11080" ], "details": "In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., \u003e 32), then drop the connection.", "id": "GSD-2020-11080", "modified": "2023-12-13T01:22:05.316413Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11080", "STATE": "PUBLIC", "TITLE": "Denial of service in nghttp2" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "nghttp2", "version": { "version_data": [ { "version_value": "\u003c 1.41.0" } ] } } ] }, "vendor_name": "nghttp2" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., \u003e 32), then drop the connection." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-707 Improper Enforcement of Message or Data Structure" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4696", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4696" }, { "name": "openSUSE-SU-2020:0802", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" }, { "name": "FEDORA-2020-f7d15c8b77", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "refsource": "CONFIRM", "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" }, { "name": "https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090", "refsource": "MISC", "url": "https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090" }, { "name": "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394", "refsource": "MISC", "url": "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "FEDORA-2020-43d5a372fc", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html" } ] }, "source": { "advisory": "GHSA-q5wr-xfw9-q7xr", "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.41.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:19.3.2:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:20.1.0:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.21", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.6.15", "versionStartIncluding": "7.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.5.19", "versionStartIncluding": "7.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.4.29", "versionStartIncluding": "7.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.3.30", "versionStartIncluding": "7.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_extensibility_workbench:14.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.1.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "10.12.0", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "10.21.0", "versionStartIncluding": "10.13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "12.12.0", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "14.4.0", "versionStartIncluding": "14.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "12.18.0", "versionStartIncluding": "12.13.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-11080" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., \u003e 32), then drop the connection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-707" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394" }, { "name": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr" }, { "name": "https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090" }, { "name": "DSA-4696", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4696" }, { "name": "openSUSE-SU-2020:0802", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" }, { "name": "FEDORA-2020-f7d15c8b77", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "FEDORA-2020-43d5a372fc", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "N/A", "refsource": "N/A", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "[debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-10-16T18:15Z", "publishedDate": "2020-06-03T23:15Z" } } }
wid-sec-w-2023-1374
Vulnerability from csaf_certbund
Published
2020-06-07 22:00
Modified
2023-10-23 22:00
Summary
Node.js: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um beliebigen Programmcode auszuführen, einen Denial of Service Angriff durchzuführen, Sicherheitsmechanismen zu umgehen oder seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Denial of Service Angriff durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen oder seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1374 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2023-1374.json" }, { "category": "self", "summary": "WID-SEC-2023-1374 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1374" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3563-2 vom 2023-10-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016813.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6380-1 vom 2023-09-19", "url": "https://ubuntu.com/security/notices/USN-6380-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6142-1 vom 2023-06-06", "url": "https://ubuntu.com/security/notices/USN-6142-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0930-1 vom 2021-03-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008538.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0932-1 vom 2021-03-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0931-1 vom 2021-03-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008539.html" }, { "category": "external", "summary": "Node.js June 2020 Security Releases vom 2020-06-07", "url": "https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/" }, { "category": "external", "summary": "Debian Security Advisory DSA-4696-1 vom 2020-06-06", "url": "https://www.debian.org/security/2020/dsa-4696" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1568-1 vom 2020-06-09", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1575-1 vom 2020-06-09", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1576-1 vom 2020-06-09", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2524 vom 2020-06-11", "url": "https://access.redhat.com/errata/RHSA-2020:2524" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2523 vom 2020-06-11", "url": "https://access.redhat.com/errata/RHSA-2020:2523" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1623-1 vom 2020-06-16", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006945.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2646 vom 2020-06-22", "url": "https://access.redhat.com/errata/RHSA-2020:2646" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2644 vom 2020-06-22", "url": "https://access.redhat.com/errata/RHSA-2020:2644" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2755 vom 2020-06-25", "url": "https://access.redhat.com/errata/RHSA-2020:2755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2784 vom 2020-07-01", "url": "https://access.redhat.com/errata/RHSA-2020:2784" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2850 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2850" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2823 vom 2020-07-06", "url": "https://access.redhat.com/errata/RHSA-2020:2823" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2849 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2849" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2848 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2848" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2847 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2847" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2852 vom 2020-07-07", "url": "https://access.redhat.com/errata/RHSA-2020:2852" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:0819-2 vom 2020-07-08", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-July/007104.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2895 vom 2020-07-13", "url": "https://access.redhat.com/errata/RHSA-2020:2895" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3042 vom 2020-07-21", "url": "https://access.redhat.com/errata/RHSA-2020:3042" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3084 vom 2020-07-21", "url": "https://access.redhat.com/errata/RHSA-2020:3084" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3194 vom 2020-07-28", "url": "https://access.redhat.com/errata/RHSA-2020:3194" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3372 vom 2020-08-06", "url": "https://access.redhat.com/errata/RHSA-2020:3372" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3525 vom 2020-08-19", "url": "https://access.redhat.com/errata/RHSA-2020:3525" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3578 vom 2020-09-08", "url": "https://access.redhat.com/errata/RHSA-2020:3578" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:1109-1 vom 2021-04-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2800-1 vom 2020-09-30", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202101-07 vom 2021-01-11", "url": "https://security.gentoo.org/glsa/202101-07" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0548 vom 2021-02-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0548.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0551 vom 2021-02-20", "url": "https://linux.oracle.com/errata/ELSA-2021-0551.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0744 vom 2021-03-09", "url": "https://linux.oracle.com/errata/ELSA-2021-0744.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2786 vom 2021-10-17", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html" } ], "source_lang": "en-US", "title": "Node.js: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-23T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:29:57.959+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1374", "initial_release_date": "2020-06-07T22:00:00.000+00:00", "revision_history": [ { "date": "2020-06-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-06-09T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-22T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-25T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-01T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-06T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-08T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-07-12T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-21T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-08-06T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-08-19T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-09-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-09-30T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-01-10T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2021-02-21T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-09T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-24T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-04-08T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-10-17T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-06-05T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-09-18T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-10-23T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "25" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Open Source Node.js \u003c 10.21.0", "product": { "name": "Open Source Node.js \u003c 10.21.0", "product_id": "T016681", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:10.21.0" } } }, { "category": "product_name", "name": "Open Source Node.js \u003c 12.18.0", "product": { "name": "Open Source Node.js \u003c 12.18.0", "product_id": "T016682", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:12.18.0" } } }, { "category": "product_name", "name": "Open Source Node.js \u003c 14.4.0", "product": { "name": "Open Source Node.js \u003c 14.4.0", "product_id": "T016683", "product_identification_helper": { "cpe": "cpe:/a:nodejs:nodejs:14.4.0" } } } ], "category": "product_name", "name": "Node.js" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10531", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie befindet sich in den \"International Components for Unicode (ICU) for C/C++\" und beruht auf einem Puffer \u00dcberlauffehler. Ein Angreifer kann dieses nutzen und Code mit den Privilegien des Angegriffenen zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstelle ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-10531" }, { "cve": "CVE-2020-11080", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie beruht auf einem Fehler bei der Verarbeitung \u00fcberlanger HTTP/2 SETTINGS Frames. Ein Angreifer kann dieses zu einem Denial of Service Angriff nutzen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-11080" }, { "cve": "CVE-2020-8172", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie beruht darauf, dass ein \"session\" Event vor einem \"secureConnect\" Event versendet werden kann. Der Application Agent betreibt ein HTTPS Session Caching. Ein Angreifer kann dieses nutzen, eine unautorisierte Verbindung aufbauen und so Sicherheitsmechanismen umgehen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-8172" }, { "cve": "CVE-2020-8174", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Node.js. Sie beruht auf Fehlern bei der Pr\u00fcfung von Bereichsgrenzen. Ein Angreifer kann dieses durch \u00dcbermittlung geeignet gestalteter Daten nutzen und erh\u00f6hte Privilegien erlangen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T012167", "T004914" ] }, "release_date": "2020-06-07T22:00:00Z", "title": "CVE-2020-8174" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.